Action not permitted
Modal body text goes here.
cve-2017-3732
Vulnerability from cvelistv5
Vendor | Product | Version | |
---|---|---|---|
▼ | OpenSSL | OpenSSL |
Version: openssl-1.1.0 Version: openssl-1.1.0a Version: openssl-1.1.0b Version: openssl-1.1.0c Version: openssl-1.0.2 Version: openssl-1.0.2a Version: openssl-1.0.2b Version: openssl-1.0.2c Version: openssl-1.0.2d Version: openssl-1.0.2e Version: openssl-1.0.2f Version: openssl-1.0.2g Version: openssl-1.0.2h Version: openssl-1.0.2i Version: openssl-1.0.2j |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T14:39:40.621Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:2185", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "name": "RHSA-2018:2186", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "RHSA-2018:2713", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "name": "FreeBSD-SA-17:02", "tags": [ "vendor-advisory", "x_refsource_FREEBSD", "x_transferred" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "name": "1037717", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037717" }, { "name": "RHSA-2018:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.tenable.com/security/tns-2017-04" }, { "name": "GLSA-201702-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/201702-07" }, { "name": "RHSA-2018:2568", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "name": "95814", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/95814" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us" }, { "name": "RHSA-2018:2187", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "OpenSSL", "vendor": "OpenSSL", "versions": [ { "status": "affected", "version": "openssl-1.1.0" }, { "status": "affected", "version": "openssl-1.1.0a" }, { "status": "affected", "version": "openssl-1.1.0b" }, { "status": "affected", "version": "openssl-1.1.0c" }, { "status": "affected", "version": "openssl-1.0.2" }, { "status": "affected", "version": "openssl-1.0.2a" }, { "status": "affected", "version": "openssl-1.0.2b" }, { "status": "affected", "version": "openssl-1.0.2c" }, { "status": "affected", "version": "openssl-1.0.2d" }, { "status": "affected", "version": "openssl-1.0.2e" }, { "status": "affected", "version": "openssl-1.0.2f" }, { "status": "affected", "version": "openssl-1.0.2g" }, { "status": "affected", "version": "openssl-1.0.2h" }, { "status": "affected", "version": "openssl-1.0.2i" }, { "status": "affected", "version": "openssl-1.0.2j" } ] } ], "credits": [ { "lang": "en", "value": "OSS-Fuzz project" } ], "datePublic": "2017-01-26T00:00:00", "descriptions": [ { "lang": "en", "value": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem." } ], "metrics": [ { "other": { "content": { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#Moderate", "value": "Moderate" }, "type": "unknown" } } ], "problemTypes": [ { "descriptions": [ { "description": "carry-propagating bug", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-23T19:08:15", "orgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "shortName": "openssl" }, "references": [ { "name": "RHSA-2018:2185", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "name": "RHSA-2018:2186", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "RHSA-2018:2713", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "name": "FreeBSD-SA-17:02", "tags": [ "vendor-advisory", "x_refsource_FREEBSD" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "name": "1037717", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037717" }, { "name": "RHSA-2018:2575", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.tenable.com/security/tns-2017-04" }, { "name": "GLSA-201702-07", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/201702-07" }, { "name": "RHSA-2018:2568", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "name": "95814", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/95814" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us" }, { "name": "RHSA-2018:2187", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ], "title": "BN_mod_exp may produce incorrect results on x86_64", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "DATE_PUBLIC": "2017-01-26", "ID": "CVE-2017-3732", "STATE": "PUBLIC", "TITLE": "BN_mod_exp may produce incorrect results on x86_64" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_value": "openssl-1.1.0" }, { "version_value": "openssl-1.1.0a" }, { "version_value": "openssl-1.1.0b" }, { "version_value": "openssl-1.1.0c" }, { "version_value": "openssl-1.0.2" }, { "version_value": "openssl-1.0.2a" }, { "version_value": "openssl-1.0.2b" }, { "version_value": "openssl-1.0.2c" }, { "version_value": "openssl-1.0.2d" }, { "version_value": "openssl-1.0.2e" }, { "version_value": "openssl-1.0.2f" }, { "version_value": "openssl-1.0.2g" }, { "version_value": "openssl-1.0.2h" }, { "version_value": "openssl-1.0.2i" }, { "version_value": "openssl-1.0.2j" } ] } } ] }, "vendor_name": "OpenSSL" } ] } }, "credit": [ { "lang": "eng", "value": "OSS-Fuzz project" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem." } ] }, "impact": [ { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#Moderate", "value": "Moderate" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "carry-propagating bug" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2185", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "name": "RHSA-2018:2186", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "RHSA-2018:2713", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "name": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b", "refsource": "MISC", "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "name": "FreeBSD-SA-17:02", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "name": "https://www.openssl.org/news/secadv/20170126.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "name": "1037717", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037717" }, { "name": "RHSA-2018:2575", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "https://www.tenable.com/security/tns-2017-04", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2017-04" }, { "name": "GLSA-201702-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201702-07" }, { "name": "RHSA-2018:2568", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "name": "95814", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95814" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us" }, { "name": "RHSA-2018:2187", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "3a12439a-ef3a-4c79-92e6-6081a721f1e5", "assignerShortName": "openssl", "cveId": "CVE-2017-3732", "datePublished": "2017-05-04T19:00:00Z", "dateReserved": "2016-12-16T00:00:00", "dateUpdated": "2024-09-16T22:08:37.371Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-3732\",\"sourceIdentifier\":\"openssl-security@openssl.org\",\"published\":\"2017-05-04T19:29:00.400\",\"lastModified\":\"2024-11-21T03:26:01.593\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.\"},{\"lang\":\"es\",\"value\":\"Hay un error de propagaci\u00f3n de d\u00edgito (carry propagation) en el procedimiento de elevaci\u00f3n al cuadrado de Montgomery x86_64 en OpenSSL versiones 1.0.2 anteriores a la 1.0.2k y versiones 1.1.0 anteriores a la 1.1.0d. Ning\u00fan algoritmo de curva el\u00edptica (EC) se ve afectado. El an\u00e1lisis sugiere que los ataques contra RSA y DSA que se realizan como resultado de este defecto ser\u00edan muy dif\u00edciles de realizar y no muy probables. Los ataques contra DH se consideran factibles (aunque muy dif\u00edciles) ya que la mayor\u00eda del trabajo necesario para deducir informaci\u00f3n sobre una clave privada se puede realizar sin conexi\u00f3n La cantidad de recursos requeridos para este tipo de ataque ser\u00eda muy significativa y, probablemente, solo estar\u00eda accesible para un n\u00famero limitado de atacantes. Un atacante podr\u00eda necesitar, adem\u00e1s, acceso a un sistema sin parches que utilice la clave privada del objetivo en un escenario con par\u00e1metros DH persistentes y una clave privada que se comparte entre m\u00faltiples clientes. Por ejemplo, esto puede ocurrir por defecto en las suites de cifrado SSL/TLS basadas en DHE de OpenSSL. Nota: Este problema es muy similar a CVE-2015-3193, pero debe tratarse como un problema separado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":5.9,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:N/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3E5C1B-EC63-4214-A0BD-0B8681CE6C8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"18797BEE-417D-4959-9AAD-C5A7C051B524\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FAA3C31-BD9D-45A9-A502-837FECA6D479\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6455A421-9956-4846-AC7C-3431E0D37D23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60F946FD-F564-49DA-B043-5943308BA9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4847BCF3-EFCE-41AF-8E7D-3D51EB9DCC5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B89180B-FB68-4DD8-B076-16E51CC7FB91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C986592-4086-4A39-9767-EF34DBAA6A53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B23181C-03DB-4E92-B3F6-6B585B5231B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94D9EC1C-4843-4026-9B05-E060E9391734\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"036FB24F-7D86-4730-8BC9-722875BEC807\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDF148A3-1AA7-4F27-85AB-414C609C626F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D7A18A-116B-4F68-BEA3-A4E9DDDA55C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFC70262-0DCD-4B46-9C96-FD18D0207511\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2E07A34-08A0-4765-AF81-46A3BDC5648A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.1.2\",\"matchCriteriaId\":\"A47FC4F7-1F77-4314-B4B3-3C5D8E335379\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"4.2.0\",\"versionEndExcluding\":\"4.7.3\",\"matchCriteriaId\":\"934083EB-2961-49FF-B8D7-B870D1FA3CB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"5.0.0\",\"versionEndIncluding\":\"5.12.0\",\"matchCriteriaId\":\"121E5D5D-B4D9-43F3-B5C9-74590192FAF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.8.1\",\"matchCriteriaId\":\"D107EC29-67E7-40C3-8E5A-324C9105C5E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*\",\"versionStartIncluding\":\"6.9.0\",\"versionEndExcluding\":\"6.9.5\",\"matchCriteriaId\":\"14346EBC-1890-472B-B236-06FE381229EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*\",\"versionStartIncluding\":\"7.0.0\",\"versionEndExcluding\":\"7.5.0\",\"matchCriteriaId\":\"2EE58CC5-2E12-4DA9-8AF2-9739CE393008\"}]}]}],\"references\":[{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95814\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037717\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2185\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2186\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2187\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2568\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2575\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2713\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201702-07\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20170126.txt\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2017-04\",\"source\":\"openssl-security@openssl.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/95814\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037717\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2185\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2568\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2018:2713\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201702-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.openssl.org/news/secadv/20170126.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://www.tenable.com/security/tns-2017-04\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
rhsa-2018_2575
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 6 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP20.\n\nSecurity Fix(es):\n\n* IBM JDK: privilege escalation via insufficiently restricted access to Attach API (CVE-2018-12539)\n\n* openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)\n\n* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)\n\n* IBM JDK: DoS in the java.math component (CVE-2018-1517)\n\n* IBM JDK: path traversal flaw in the Diagnostic Tooling Framework (CVE-2018-1656)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\n* OpenSSL: Double-free in DSA code (CVE-2016-0705)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-0705. Upstream acknowledges Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2575", "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "1618767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618767" }, { "category": "external", "summary": "1618869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618869" }, { "category": "external", "summary": "1618871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618871" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2575.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2024-11-15T02:12:25+00:00", "generator": { "date": "2024-11-15T02:12:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2575", "initial_release_date": "2018-08-28T19:19:26+00:00", "revision_history": [ { "date": "2018-08-28T19:19:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-28T19:19:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T02:12:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.20-1jpp.1.el6_10?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el6_10?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Client-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Workstation-Supplementary-6.10.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Adam Langley" ], "organization": "Google/BoringSSL", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0705", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310596" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Double-free in DSA code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0705" }, { "category": "external", "summary": "RHBZ#1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" } ], "release_date": "2016-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Double-free in DSA code" }, { "cve": "CVE-2017-3732", "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416856" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: BN_mod_exp may produce incorrect results on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3732" }, { "category": "external", "summary": "RHBZ#1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: BN_mod_exp may produce incorrect results on x86_64" }, { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2017-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1509169" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: bn_sqrx8x_internal carry bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "RHBZ#1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3736", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171102.txt", "url": "https://www.openssl.org/news/secadv/20171102.txt" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: bn_sqrx8x_internal carry bug on x86_64" }, { "cve": "CVE-2018-1517", "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618871" } ], "notes": [ { "category": "description", "text": "A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: DoS in the java.math component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1517" }, { "category": "external", "summary": "RHBZ#1618871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1517", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1517" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: DoS in the java.math component" }, { "cve": "CVE-2018-1656", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618869" } ], "notes": [ { "category": "description", "text": "The IBM Java Runtime Environment\u0027s Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: path traversal flaw in the Diagnostic Tooling Framework", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1656" }, { "category": "external", "summary": "RHBZ#1618869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618869" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1656", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1656" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: path traversal flaw in the Diagnostic Tooling Framework" }, { "cve": "CVE-2018-2940", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602146" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "RHBZ#1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)" }, { "cve": "CVE-2018-2952", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2018-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1600925" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "RHBZ#1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2952", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)" }, { "cve": "CVE-2018-2973", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602145" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "RHBZ#1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)" }, { "cve": "CVE-2018-12539", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618767" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: privilege escalation via insufficiently restricted access to Attach API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12539" }, { "category": "external", "summary": "RHBZ#1618767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12539", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12539" } ], "release_date": "2018-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-28T19:19:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2575" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Client-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6ComputeNode-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.i686", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.ppc64", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Workstation-Supplementary-6.10.z:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: privilege escalation via insufficiently restricted access to Attach API" } ] }
rhsa-2018_2185
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this release as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release.\n\nThis release upgrades OpenSSL to version 1.0.2.n\n\nSecurity Fix(es):\n\n* openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() (CVE-2016-2182)\n\n* openssl: Insufficient TLS session ticket HMAC length checks (CVE-2016-6302)\n\n* openssl: certificate message OOB reads (CVE-2016-6306)\n\n* openssl: Carry propagating bug in Montgomery multiplication (CVE-2016-7055)\n\n* openssl: Truncated packet could crash via OOB read (CVE-2017-3731)\n\n* openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)\n\n* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)\n\n* openssl: Read/write after SSL object in error state (CVE-2017-3737)\n\n* openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6306 \nand CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6306.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2185", "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/" }, { "category": "external", "summary": "1367340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367340" }, { "category": "external", "summary": "1369855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369855" }, { "category": "external", "summary": "1377594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377594" }, { "category": "external", "summary": "1393929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929" }, { "category": "external", "summary": "1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "external", "summary": "1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "1523504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504" }, { "category": "external", "summary": "1523510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510" }, { "category": "external", "summary": "JBCS-373", "url": "https://issues.redhat.com/browse/JBCS-373" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2185.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 7 security update", "tracking": { "current_release_date": "2024-11-22T11:16:03+00:00", "generator": { "date": "2024-11-22T11:16:03+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2185", "initial_release_date": "2018-07-12T16:14:46+00:00", "revision_history": [ { "date": "2018-07-12T16:14:46+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-07-12T16:14:46+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:16:03+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-debuginfo@2.4.1-19.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-19.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-17.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-17.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb-debuginfo@5.4-36.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.8-1.Final_redhat_2.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.43-1.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.43-1.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.43-1.redhat_1.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-14.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-14.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-14.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-9.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-11.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.29.0-8.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.29.0-8.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.29.0-8.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-23.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-23.GA.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-17.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-17.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-17.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-17.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-17.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-17.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-17.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-17.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-17.jbcs.el7?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.1.0-1.redhat_2.jbcs.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo@1.1.0-1.redhat_2.jbcs.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-19.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-17.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-36.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_2.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.43-1.redhat_1.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-14.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-9.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-11.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "product_id": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.29.0-8.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-23.GA.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "product_id": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-17.jbcs.el7?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.1.0-1.redhat_2.jbcs.el7?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.1.0-1.redhat_2.1.jbcs.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-17.jbcs.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.1.0-1.redhat_2.1.jbcs.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64 as a component of Red Hat JBoss Core Services on RHEL 7 Server", "product_id": "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64", "relates_to_product_reference": "7Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2182", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2016-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367340" } ], "notes": [ { "category": "description", "text": "An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2182" }, { "category": "external", "summary": "RHBZ#1367340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()" }, { "cve": "CVE-2016-4975", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2016-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375968" } ], "notes": [ { "category": "description", "text": "It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4975" }, { "category": "external", "summary": "RHBZ#1375968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4975", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4975" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir" }, { "cve": "CVE-2016-6302", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-08-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1369855" } ], "notes": [ { "category": "description", "text": "An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Insufficient TLS session ticket HMAC length checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6302" }, { "category": "external", "summary": "RHBZ#1369855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369855" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6302", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Insufficient TLS session ticket HMAC length checks" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6306", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377594" } ], "notes": [ { "category": "description", "text": "Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: certificate message OOB reads", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "RHBZ#1377594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6306", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6306" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: certificate message OOB reads" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] } ], "cve": "CVE-2016-7055", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2016-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1393929" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker\u0027s direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Carry propagating bug in Montgomery multiplication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7055" }, { "category": "external", "summary": "RHBZ#1393929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7055", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20161110.txt", "url": "https://www.openssl.org/news/secadv/20161110.txt" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2016-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Carry propagating bug in Montgomery multiplication" }, { "cve": "CVE-2017-3731", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416852" } ], "notes": [ { "category": "description", "text": "An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Truncated packet could crash via OOB read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "RHBZ#1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3731", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Truncated packet could crash via OOB read" }, { "cve": "CVE-2017-3732", "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416856" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: BN_mod_exp may produce incorrect results on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3732" }, { "category": "external", "summary": "RHBZ#1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: BN_mod_exp may produce incorrect results on x86_64" }, { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2017-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1509169" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: bn_sqrx8x_internal carry bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "RHBZ#1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3736", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171102.txt", "url": "https://www.openssl.org/news/secadv/20171102.txt" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: bn_sqrx8x_internal carry bug on x86_64" }, { "cve": "CVE-2017-3737", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2017-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1523504" } ], "notes": [ { "category": "description", "text": "OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \"error state\" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read/write after SSL object in error state", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3737" }, { "category": "external", "summary": "RHBZ#1523504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3737", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171207.txt", "url": "https://www.openssl.org/news/secadv/20171207.txt" } ], "release_date": "2017-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read/write after SSL object in error state" }, { "cve": "CVE-2017-3738", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2017-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1523510" } ], "notes": [ { "category": "description", "text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: rsaz_1024_mul_avx2 overflow bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3738" }, { "category": "external", "summary": "RHBZ#1523510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171207.txt", "url": "https://www.openssl.org/news/secadv/20171207.txt" } ], "release_date": "2017-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:46+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2185" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el7.noarch", "7Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.src", "7Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el7.x86_64", "7Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: rsaz_1024_mul_avx2 overflow bug on x86_64" } ] }
rhsa-2018_2568
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP20.\n\nSecurity Fix(es):\n\n* IBM JDK: privilege escalation via insufficiently restricted access to Attach API (CVE-2018-12539)\n\n* openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)\n\n* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)\n\n* IBM JDK: DoS in the java.math component (CVE-2018-1517)\n\n* IBM JDK: path traversal flaw in the Diagnostic Tooling Framework (CVE-2018-1656)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\n* OpenSSL: Double-free in DSA code (CVE-2016-0705)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-0705. Upstream acknowledges Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2568", "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "1618767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618767" }, { "category": "external", "summary": "1618869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618869" }, { "category": "external", "summary": "1618871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618871" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2568.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2024-11-15T02:12:20+00:00", "generator": { "date": "2024-11-15T02:12:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2568", "initial_release_date": "2018-08-27T14:20:44+00:00", "revision_history": [ { "date": "2018-08-27T14:20:44+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-08-27T14:20:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T02:12:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.20-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el7?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-plugin@1.8.0.5.20-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el7?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el7?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el7?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-jdbc@1.8.0.5.20-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-src@1.8.0.5.20-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_id": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-demo@1.8.0.5.20-1jpp.1.el7?arch=ppc64le\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Client Supplementary (v. 7)", "product_id": "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Client-7.5.Z-Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Supplementary (v. 7)", "product_id": "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7ComputeNode-7.5.Z-ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 7)", "product_id": "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Server-7.5.Z-Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 7)", "product_id": "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" }, "product_reference": "java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "relates_to_product_reference": "7Workstation-7.5.Z-Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Adam Langley" ], "organization": "Google/BoringSSL", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0705", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310596" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Double-free in DSA code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0705" }, { "category": "external", "summary": "RHBZ#1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" } ], "release_date": "2016-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Double-free in DSA code" }, { "cve": "CVE-2017-3732", "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416856" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: BN_mod_exp may produce incorrect results on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3732" }, { "category": "external", "summary": "RHBZ#1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: BN_mod_exp may produce incorrect results on x86_64" }, { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2017-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1509169" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: bn_sqrx8x_internal carry bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "RHBZ#1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3736", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171102.txt", "url": "https://www.openssl.org/news/secadv/20171102.txt" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: bn_sqrx8x_internal carry bug on x86_64" }, { "cve": "CVE-2018-1517", "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618871" } ], "notes": [ { "category": "description", "text": "A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: DoS in the java.math component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1517" }, { "category": "external", "summary": "RHBZ#1618871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1517", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1517" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: DoS in the java.math component" }, { "cve": "CVE-2018-1656", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618869" } ], "notes": [ { "category": "description", "text": "The IBM Java Runtime Environment\u0027s Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: path traversal flaw in the Diagnostic Tooling Framework", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1656" }, { "category": "external", "summary": "RHBZ#1618869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618869" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1656", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1656" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: path traversal flaw in the Diagnostic Tooling Framework" }, { "cve": "CVE-2018-2940", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602146" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "RHBZ#1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)" }, { "cve": "CVE-2018-2952", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2018-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1600925" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "RHBZ#1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2952", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)" }, { "cve": "CVE-2018-2973", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602145" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "RHBZ#1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)" }, { "cve": "CVE-2018-12539", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618767" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: privilege escalation via insufficiently restricted access to Attach API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12539" }, { "category": "external", "summary": "RHBZ#1618767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12539", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12539" } ], "release_date": "2018-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-08-27T14:20:44+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2568" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Client-7.5.Z-Client:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7ComputeNode-7.5.Z-ComputeNode:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Server-7.5.Z-Server:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-demo-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-jdbc-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-plugin-1:1.8.0.5.20-1jpp.1.el7.x86_64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.ppc64le", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.s390x", "7Workstation-7.5.Z-Workstation:java-1.8.0-ibm-src-1:1.8.0.5.20-1jpp.1.el7.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK: privilege escalation via insufficiently restricted access to Attach API" } ] }
rhsa-2018_2186
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this release as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release.\n\nThis release upgrades OpenSSL to version 1.0.2.n\n\nSecurity Fix(es):\n\n* openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() (CVE-2016-2182)\n\n* openssl: Insufficient TLS session ticket HMAC length checks (CVE-2016-6302)\n\n* openssl: certificate message OOB reads (CVE-2016-6306)\n\n* openssl: Carry propagating bug in Montgomery multiplication (CVE-2016-7055)\n\n* openssl: Truncated packet could crash via OOB read (CVE-2017-3731)\n\n* openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)\n\n* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)\n\n* openssl: Read/write after SSL object in error state (CVE-2017-3737)\n\n* openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6306 \nand CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6306.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2186", "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/" }, { "category": "external", "summary": "1367340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367340" }, { "category": "external", "summary": "1369855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369855" }, { "category": "external", "summary": "1377594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377594" }, { "category": "external", "summary": "1393929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929" }, { "category": "external", "summary": "1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "external", "summary": "1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "1523504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504" }, { "category": "external", "summary": "1523510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510" }, { "category": "external", "summary": "JBCS-372", "url": "https://issues.redhat.com/browse/JBCS-372" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2186.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 6 security update", "tracking": { "current_release_date": "2024-11-22T11:15:56+00:00", "generator": { "date": "2024-11-22T11:15:56+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2186", "initial_release_date": "2018-07-12T16:14:52+00:00", "revision_history": [ { "date": "2018-07-12T16:14:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-07-12T16:14:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:15:56+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product": { "name": "Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-debuginfo@2.4.1-19.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-19.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-17.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-17.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb-debuginfo@5.4-36.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.8-1.Final_redhat_2.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.43-1.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.43-1.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.43-1.redhat_1.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-14.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-14.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-14.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-9.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-11.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-11.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-11.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-11.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-11.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-11.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.29.0-8.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.29.0-8.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.29.0-8.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-23.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-23.GA.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-17.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-17.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-17.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-17.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-17.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-17.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-17.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-17.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-17.jbcs.el6?arch=x86_64" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.1.0-1.redhat_2.jbcs.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo@1.1.0-1.redhat_2.jbcs.el6?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt-debuginfo@2.4.1-19.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-19.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-17.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx-debuginfo@0.9.6-17.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb-debuginfo@5.4-36.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_2.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native-debuginfo@1.3.8-1.Final_redhat_2.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-debuginfo@1.2.43-1.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-ap24@1.2.43-1.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk-manual@1.2.43-1.redhat_1.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-debuginfo@1.6.3-14.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-devel@1.6.3-14.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-14.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-openssl@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-nss@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-ldap@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-sqlite@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-devel@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-odbc@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-debuginfo@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-mysql@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "product_id": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util-pgsql@1.6.1-9.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-devel@1.0.2n-11.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-debuginfo@1.0.2n-11.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-11.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-libs@1.0.2n-11.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-perl@1.0.2n-11.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "product_id": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl-static@1.0.2n-11.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.29.0-8.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-debuginfo@1.29.0-8.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "product_id": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2-devel@1.29.0-8.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-23.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security-debuginfo@2.9.1-23.GA.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-debuginfo@2.4.29-17.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-tools@2.4.29-17.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-devel@2.4.29-17.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-selinux@2.4.29-17.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_session@2.4.29-17.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_proxy_html@2.4.29-17.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ssl@2.4.29-17.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-17.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "product_id": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_ldap@2.4.29-17.jbcs.el6?arch=i686" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.1.0-1.redhat_2.jbcs.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo@1.1.0-1.redhat_2.jbcs.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_rt@2.4.1-19.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_bmx@0.9.6-17.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_auth_kerb@5.4-36.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_cluster-native@1.3.8-1.Final_redhat_2.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_jk@1.2.43-1.redhat_1.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "product_id": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr@1.6.3-14.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "product_id": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apr-util@1.6.1-9.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "product": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "product_id": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-openssl@1.0.2n-11.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "product": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "product_id": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-nghttp2@1.29.0-8.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "product": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "product_id": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-mod_security@2.9.1-23.GA.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "product": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "product_id": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd@2.4.29-17.jbcs.el6?arch=src" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "product_id": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon-jsvc@1.1.0-1.redhat_2.jbcs.el6?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.1.0-1.redhat_2.1.jbcs.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "product_id": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-httpd-manual@2.4.29-17.jbcs.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "product": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "product_id": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbcs-httpd24-apache-commons-daemon@1.1.0-1.redhat_2.1.jbcs.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch" }, "product_reference": "jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "relates_to_product_reference": "6Server-JBCS" }, { "category": "default_component_of", "full_product_name": { "name": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64 as a component of Red Hat JBoss Core Services on RHEL 6 Server", "product_id": "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" }, "product_reference": "jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64", "relates_to_product_reference": "6Server-JBCS" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2182", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2016-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367340" } ], "notes": [ { "category": "description", "text": "An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2182" }, { "category": "external", "summary": "RHBZ#1367340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()" }, { "cve": "CVE-2016-4975", "cwe": { "id": "CWE-113", "name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)" }, "discovery_date": "2016-09-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1375968" } ], "notes": [ { "category": "description", "text": "It was found that Apache was vulnerable to a HTTP response splitting attack for sites which use mod_userdir. An attacker could use this flaw to inject CRLF characters into the HTTP header and could possibly gain access to secure data.", "title": "Vulnerability description" }, { "category": "summary", "text": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-4975" }, { "category": "external", "summary": "RHBZ#1375968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1375968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-4975", "url": "https://www.cve.org/CVERecord?id=CVE-2016-4975" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_22.html#CVE-2016-4975" }, { "category": "external", "summary": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975", "url": "https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2016-4975" } ], "release_date": "2018-08-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "httpd: CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir" }, { "cve": "CVE-2016-6302", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-08-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1369855" } ], "notes": [ { "category": "description", "text": "An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Insufficient TLS session ticket HMAC length checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6302" }, { "category": "external", "summary": "RHBZ#1369855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369855" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6302", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Insufficient TLS session ticket HMAC length checks" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6306", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377594" } ], "notes": [ { "category": "description", "text": "Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: certificate message OOB reads", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "RHBZ#1377594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6306", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6306" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: certificate message OOB reads" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] } ], "cve": "CVE-2016-7055", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2016-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1393929" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker\u0027s direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Carry propagating bug in Montgomery multiplication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7055" }, { "category": "external", "summary": "RHBZ#1393929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7055", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20161110.txt", "url": "https://www.openssl.org/news/secadv/20161110.txt" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2016-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Carry propagating bug in Montgomery multiplication" }, { "cve": "CVE-2017-3731", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416852" } ], "notes": [ { "category": "description", "text": "An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Truncated packet could crash via OOB read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "RHBZ#1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3731", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Truncated packet could crash via OOB read" }, { "cve": "CVE-2017-3732", "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416856" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: BN_mod_exp may produce incorrect results on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3732" }, { "category": "external", "summary": "RHBZ#1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: BN_mod_exp may produce incorrect results on x86_64" }, { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2017-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1509169" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: bn_sqrx8x_internal carry bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "RHBZ#1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3736", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171102.txt", "url": "https://www.openssl.org/news/secadv/20171102.txt" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: bn_sqrx8x_internal carry bug on x86_64" }, { "cve": "CVE-2017-3737", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2017-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1523504" } ], "notes": [ { "category": "description", "text": "OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \"error state\" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read/write after SSL object in error state", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3737" }, { "category": "external", "summary": "RHBZ#1523504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3737", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171207.txt", "url": "https://www.openssl.org/news/secadv/20171207.txt" } ], "release_date": "2017-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read/write after SSL object in error state" }, { "cve": "CVE-2017-3738", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2017-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1523510" } ], "notes": [ { "category": "description", "text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: rsaz_1024_mul_avx2 overflow bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3738" }, { "category": "external", "summary": "RHBZ#1523510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171207.txt", "url": "https://www.openssl.org/news/secadv/20171207.txt" } ], "release_date": "2017-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:14:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2186" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-0:1.1.0-1.redhat_2.1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1:1.1.0-1.redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-debuginfo-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-devel-0:1.6.3-14.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-apr-util-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-debuginfo-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-devel-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-ldap-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-mysql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-nss-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-odbc-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-openssl-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-pgsql-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-apr-util-sqlite-0:1.6.1-9.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-httpd-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-debuginfo-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-devel-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-manual-0:2.4.29-17.jbcs.el6.noarch", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-selinux-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-httpd-tools-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_auth_kerb-debuginfo-0:5.4-36.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_bmx-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_bmx-debuginfo-0:0.9.6-17.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_cluster-native-debuginfo-0:1.3.8-1.Final_redhat_2.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-0:1.2.43-1.redhat_1.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-ap24-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-debuginfo-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_jk-manual-0:1.2.43-1.redhat_1.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ldap-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_proxy_html-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_rt-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_rt-debuginfo-0:2.4.1-19.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-mod_security-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_security-debuginfo-0:2.9.1-23.GA.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_session-0:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-mod_ssl-1:2.4.29-17.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-nghttp2-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-debuginfo-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-nghttp2-devel-0:1.29.0-8.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.src", "6Server-JBCS:jbcs-httpd24-openssl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-debuginfo-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-devel-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-libs-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-perl-1:1.0.2n-11.jbcs.el6.x86_64", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.i686", "6Server-JBCS:jbcs-httpd24-openssl-static-1:1.0.2n-11.jbcs.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: rsaz_1024_mul_avx2 overflow bug on x86_64" } ] }
rhsa-2018_2187
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now available.\n\nRed Hat Product Security has rated this release as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "This release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering.\n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer\nto the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release.\n\nThis release upgrades OpenSSL to version 1.0.2.n\n\nSecurity Fix(es):\n\n* openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() (CVE-2016-2182)\n\n* openssl: Insufficient TLS session ticket HMAC length checks (CVE-2016-6302)\n\n* openssl: certificate message OOB reads (CVE-2016-6306)\n\n* openssl: Carry propagating bug in Montgomery multiplication (CVE-2016-7055)\n\n* openssl: Truncated packet could crash via OOB read (CVE-2017-3731)\n\n* openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)\n\n* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)\n\n* openssl: Read/write after SSL object in error state (CVE-2017-3737)\n\n* openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6306\nand CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360\nInc.) as the original reporter of CVE-2016-6306.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2187", "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/", "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/" }, { "category": "external", "summary": "1367340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367340" }, { "category": "external", "summary": "1369855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369855" }, { "category": "external", "summary": "1377594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377594" }, { "category": "external", "summary": "1393929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929" }, { "category": "external", "summary": "1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "external", "summary": "1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "1523504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504" }, { "category": "external", "summary": "1523510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2187.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "tracking": { "current_release_date": "2024-11-22T11:16:15+00:00", "generator": { "date": "2024-11-22T11:16:15+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2187", "initial_release_date": "2018-07-12T16:04:49+00:00", "revision_history": [ { "date": "2018-07-12T16:04:49+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-07-12T16:04:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T11:16:15+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Core Services 1", "product": { "name": "Red Hat JBoss Core Services 1", "product_id": "Red Hat JBoss Core Services 1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_core_services:1" } } } ], "category": "product_family", "name": "Red Hat JBoss Core Services" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2016-2182", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2016-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1367340" } ], "notes": [ { "category": "description", "text": "An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-2182" }, { "category": "external", "summary": "RHBZ#1367340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1367340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-2182", "url": "https://www.cve.org/CVERecord?id=CVE-2016-2182" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-2182" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()" }, { "cve": "CVE-2016-6302", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-08-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1369855" } ], "notes": [ { "category": "description", "text": "An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Insufficient TLS session ticket HMAC length checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6302" }, { "category": "external", "summary": "RHBZ#1369855", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1369855" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6302", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6302" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6302" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-08-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Insufficient TLS session ticket HMAC length checks" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Shi Lei" ], "organization": "Gear Team of Qihoo 360 Inc.", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-6306", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2016-09-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1377594" } ], "notes": [ { "category": "description", "text": "Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: certificate message OOB reads", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-6306" }, { "category": "external", "summary": "RHBZ#1377594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1377594" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-6306", "url": "https://www.cve.org/CVERecord?id=CVE-2016-6306" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6306" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20160922.txt", "url": "https://www.openssl.org/news/secadv/20160922.txt" } ], "release_date": "2016-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: certificate message OOB reads" }, { "acknowledgments": [ { "names": [ "the OpenSSL project" ] } ], "cve": "CVE-2016-7055", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2016-10-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1393929" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the Broadwell-specific Montgomery multiplication procedure in OpenSSL 1.0.2 and 1.1.0 before 1.1.0c that handles input lengths divisible by, but longer than 256 bits. Analysis suggests that attacks against RSA, DSA and DH private keys are impossible. This is because the subroutine in question is not used in operations with the private key itself and an input of the attacker\u0027s direct choice. Otherwise the bug can manifest itself as transient authentication and key negotiation failures or reproducible erroneous outcome of public-key operations with specially crafted input. Among EC algorithms only Brainpool P-512 curves are affected and one presumably can attack ECDH key negotiation. Impact was not analyzed in detail, because pre-requisites for attack are considered unlikely. Namely multiple clients have to choose the curve in question and the server has to share the private key among them, neither of which is default behaviour. Even then only clients that chose the curve will be affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Carry propagating bug in Montgomery multiplication", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-7055" }, { "category": "external", "summary": "RHBZ#1393929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1393929" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-7055", "url": "https://www.cve.org/CVERecord?id=CVE-2016-7055" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-7055" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20161110.txt", "url": "https://www.openssl.org/news/secadv/20161110.txt" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2016-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: Carry propagating bug in Montgomery multiplication" }, { "cve": "CVE-2017-3731", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416852" } ], "notes": [ { "category": "description", "text": "An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Truncated packet could crash via OOB read", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3731" }, { "category": "external", "summary": "RHBZ#1416852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3731", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3731" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3731" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Truncated packet could crash via OOB read" }, { "cve": "CVE-2017-3732", "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416856" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: BN_mod_exp may produce incorrect results on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3732" }, { "category": "external", "summary": "RHBZ#1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: BN_mod_exp may produce incorrect results on x86_64" }, { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2017-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1509169" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: bn_sqrx8x_internal carry bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "RHBZ#1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3736", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171102.txt", "url": "https://www.openssl.org/news/secadv/20171102.txt" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: bn_sqrx8x_internal carry bug on x86_64" }, { "cve": "CVE-2017-3737", "cwe": { "id": "CWE-391", "name": "Unchecked Error Condition" }, "discovery_date": "2017-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1523504" } ], "notes": [ { "category": "description", "text": "OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \"error state\" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: Read/write after SSL object in error state", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3737" }, { "category": "external", "summary": "RHBZ#1523504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3737", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3737" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3737" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171207.txt", "url": "https://www.openssl.org/news/secadv/20171207.txt" } ], "release_date": "2017-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: Read/write after SSL object in error state" }, { "cve": "CVE-2017-3738", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2017-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1523510" } ], "notes": [ { "category": "description", "text": "There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: rsaz_1024_mul_avx2 overflow bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Core Services 1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3738" }, { "category": "external", "summary": "RHBZ#1523510", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1523510" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3738", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3738" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3738" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171207.txt", "url": "https://www.openssl.org/news/secadv/20171207.txt" } ], "release_date": "2017-12-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-07-12T16:04:49+00:00", "details": "The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).\n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically.", "product_ids": [ "Red Hat JBoss Core Services 1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2187" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Core Services 1" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "openssl: rsaz_1024_mul_avx2 overflow bug on x86_64" } ] }
rhsa-2018_2713
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for java-1.8.0-ibm is now available for Red Hat Satellite 5.8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit.\n\nThis update upgrades IBM Java SE 8 to version 8 SR5-FP20.\n\nSecurity Fix(es):\n\n* IBM JDK: privilege escalation via insufficiently restricted access to Attach API (CVE-2018-12539)\n\n* openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)\n\n* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)\n\n* IBM JDK: DoS in the java.math component (CVE-2018-1517)\n\n* IBM JDK: path traversal flaw in the Diagnostic Tooling Framework (CVE-2018-1656)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries) (CVE-2018-2940)\n\n* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)\n\n* Oracle JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE) (CVE-2018-2973)\n\n* OpenSSL: Double-free in DSA code (CVE-2016-0705)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-0705. Upstream acknowledges Adam Langley (Google/BoringSSL) as the original reporter of CVE-2016-0705.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2018:2713", "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "1618767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618767" }, { "category": "external", "summary": "1618869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618869" }, { "category": "external", "summary": "1618871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618871" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2018/rhsa-2018_2713.json" } ], "title": "Red Hat Security Advisory: java-1.8.0-ibm security update", "tracking": { "current_release_date": "2024-11-15T02:12:51+00:00", "generator": { "date": "2024-11-15T02:12:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2018:2713", "initial_release_date": "2018-09-17T14:54:13+00:00", "revision_history": [ { "date": "2018-09-17T14:54:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2018-09-17T14:54:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-15T02:12:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.8 (RHEL v.6)", "product": { "name": "Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.8::el6" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el6_10?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm-devel@1.8.0.5.20-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_id": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.8.0-ibm@1.8.0.5.20-1jpp.1.el6_10?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "relates_to_product_reference": "6Server-Satellite58" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64 as a component of Red Hat Satellite 5.8 (RHEL v.6)", "product_id": "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" }, "product_reference": "java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "relates_to_product_reference": "6Server-Satellite58" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "the OpenSSL project" ] }, { "names": [ "Adam Langley" ], "organization": "Google/BoringSSL", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2016-0705", "discovery_date": "2016-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1310596" } ], "notes": [ { "category": "description", "text": "A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenSSL: Double-free in DSA code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0705" }, { "category": "external", "summary": "RHBZ#1310596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1310596" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0705", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0705" } ], "release_date": "2016-02-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenSSL: Double-free in DSA code" }, { "cve": "CVE-2017-3732", "discovery_date": "2017-01-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1416856" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: BN_mod_exp may produce incorrect results on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3732" }, { "category": "external", "summary": "RHBZ#1416856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1416856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3732", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3732" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20170126.txt", "url": "https://www.openssl.org/news/secadv/20170126.txt" } ], "release_date": "2017-01-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: BN_mod_exp may produce incorrect results on x86_64" }, { "cve": "CVE-2017-3736", "cwe": { "id": "CWE-682", "name": "Incorrect Calculation" }, "discovery_date": "2017-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1509169" } ], "notes": [ { "category": "description", "text": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.", "title": "Vulnerability description" }, { "category": "summary", "text": "openssl: bn_sqrx8x_internal carry bug on x86_64", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2017-3736" }, { "category": "external", "summary": "RHBZ#1509169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1509169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2017-3736", "url": "https://www.cve.org/CVERecord?id=CVE-2017-3736" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3736" }, { "category": "external", "summary": "https://www.openssl.org/news/secadv/20171102.txt", "url": "https://www.openssl.org/news/secadv/20171102.txt" } ], "release_date": "2017-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "openssl: bn_sqrx8x_internal carry bug on x86_64" }, { "cve": "CVE-2018-1517", "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618871" } ], "notes": [ { "category": "description", "text": "A flaw in the java.math component in IBM SDK, Java Technology Edition 6.0, 7.0, and 8.0 may allow an attacker to inflict a denial-of-service attack with specially crafted String data. IBM X-Force ID: 141681.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: DoS in the java.math component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1517" }, { "category": "external", "summary": "RHBZ#1618871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1517", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1517" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: DoS in the java.math component" }, { "cve": "CVE-2018-1656", "cwe": { "id": "CWE-22", "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618869" } ], "notes": [ { "category": "description", "text": "The IBM Java Runtime Environment\u0027s Diagnostic Tooling Framework for Java (DTFJ) (IBM SDK, Java Technology Edition 6.0 , 7.0, and 8.0) does not protect against path traversal attacks when extracting compressed dump files. IBM X-Force ID: 144882.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: path traversal flaw in the Diagnostic Tooling Framework", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-1656" }, { "category": "external", "summary": "RHBZ#1618869", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618869" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-1656", "url": "https://www.cve.org/CVERecord?id=CVE-2018-1656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-1656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-1656" } ], "release_date": "2018-08-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: path traversal flaw in the Diagnostic Tooling Framework" }, { "cve": "CVE-2018-2940", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602146" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2940" }, { "category": "external", "summary": "RHBZ#1602146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2940", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2940" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2940" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (Libraries)" }, { "cve": "CVE-2018-2952", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2018-07-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1600925" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2952" }, { "category": "external", "summary": "RHBZ#1600925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1600925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2952", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2952" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547)" }, { "cve": "CVE-2018-2973", "discovery_date": "2018-07-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1602145" } ], "notes": [ { "category": "description", "text": "Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-2973" }, { "category": "external", "summary": "RHBZ#1602145", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1602145" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-2973", "url": "https://www.cve.org/CVERecord?id=CVE-2018-2973" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-2973" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html#AppendixJAVA" } ], "release_date": "2018-07-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: unspecified vulnerability fixed in 6u201, 7u191, 8u181, and 10.0.2 (JSSE)" }, { "cve": "CVE-2018-12539", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "discovery_date": "2018-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618767" } ], "notes": [ { "category": "description", "text": "In Eclipse OpenJ9 version 0.8, users other than the process owner may be able to use Java Attach API to connect to an Eclipse OpenJ9 or IBM JVM on the same machine and use Attach API operations, which includes the ability to execute untrusted native code. Attach API is enabled by default on Windows, Linux and AIX JVMs and can be disabled using the command line option -Dcom.ibm.tools.attach.enable=no.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: privilege escalation via insufficiently restricted access to Attach API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2018-12539" }, { "category": "external", "summary": "RHBZ#1618767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618767" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2018-12539", "url": "https://www.cve.org/CVERecord?id=CVE-2018-12539" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-12539", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12539" } ], "release_date": "2018-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2018-09-17T14:54:13+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nFor this update to take effect, Red Hat Satellite must be restarted (\"/usr/sbin/rhn-satellite restart\"). All running instances of IBM Java must be restarted for this update to take effect.", "product_ids": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2018:2713" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-1:1.8.0.5.20-1jpp.1.el6_10.x86_64", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.s390x", "6Server-Satellite58:java-1.8.0-ibm-devel-1:1.8.0.5.20-1jpp.1.el6_10.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: privilege escalation via insufficiently restricted access to Attach API" } ] }
var-201705-3649
Vulnerability from variot
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem. OpenSSL There is a service disruption ( crash ) There are vulnerabilities that are put into a state.Service operation interruption ( crash ) There is a possibility of being put into a state. OpenSSL Security Advisory [07 Dec 2017] ========================================
Read/write after SSL object in error state (CVE-2017-3737)
Severity: Moderate
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer.
In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error.
This issue does not affect OpenSSL 1.1.0.
OpenSSL 1.0.2 users should upgrade to 1.0.2n
This issue was reported to OpenSSL on 10th November 2017 by David Benjamin (Google). The fix was proposed by David Benjamin and implemented by Matt Caswell of the OpenSSL development team.
rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
Severity: Low
There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli.
This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation).
Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
OpenSSL 1.0.2 users should upgrade to 1.0.2n
This issue was reported to OpenSSL on 22nd November 2017 by David Benjamin (Google). The issue was originally found via the OSS-Fuzz project. The fix was developed by Andy Polyakov of the OpenSSL development team.
Note
Support for version 1.0.1 ended on 31st December 2016. Support for versions 0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer receiving security updates.
References
URL for this Security Advisory: https://www.openssl.org/news/secadv/20171207.txt
Note: the online version of the advisory may be updated with additional details over time.
For details of OpenSSL severity classifications please see: https://www.openssl.org/policies/secpolicy.html . OpenSSL Security Advisory [27 Mar 2018] ========================================
Constructed ASN.1 types with a recursive definition could exceed the stack (CVE-2018-0739)
Severity: Moderate
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe.
Incorrect CRYPTO_memcmp on HP-UX PA-RISC (CVE-2018-0733)
Severity: Moderate
Because of an implementation bug the PA-RISC CRYPTO_memcmp function is effectively reduced to only comparing the least significant bit of each byte. This allows an attacker to forge messages that would be considered as authenticated in an amount of tries lower than that guaranteed by the security claims of the scheme. The module can only be compiled by the HP-UX assembler, so that only HP-UX PA-RISC targets are affected. Solution:
The References section of this erratum contains a download link (you must log in to download the update). Before applying the update, back up your existing Red Hat JBoss Web Server installation (including all applications and configuration files).
After installing the updated packages, the httpd daemon will be restarted automatically. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 6 security update Advisory ID: RHSA-2018:2186-01 Product: Red Hat JBoss Core Services Advisory URL: https://access.redhat.com/errata/RHSA-2018:2186 Issue date: 2018-07-12 CVE Names: CVE-2016-2182 CVE-2016-6302 CVE-2016-6306 CVE-2016-7055 CVE-2017-3731 CVE-2017-3732 CVE-2017-3736 CVE-2017-3737 CVE-2017-3738 ==================================================================== 1. Summary:
Red Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this release as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Relevant releases/architectures:
Red Hat JBoss Core Services on RHEL 6 Server - i386, noarch, x86_64
- Description:
This release adds the new Apache HTTP Server 2.4.29 packages that are part of the JBoss Core Services offering.
This release serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer to the Release Notes for information on the most significant bug fixes, enhancements and component upgrades included in this release.
This release upgrades OpenSSL to version 1.0.2.n
Security Fix(es):
-
openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() (CVE-2016-2182)
-
openssl: Insufficient TLS session ticket HMAC length checks (CVE-2016-6302)
-
openssl: certificate message OOB reads (CVE-2016-6306)
-
openssl: Carry propagating bug in Montgomery multiplication (CVE-2016-7055)
-
openssl: Truncated packet could crash via OOB read (CVE-2017-3731)
-
openssl: BN_mod_exp may produce incorrect results on x86_64 (CVE-2017-3732)
-
openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)
-
openssl: Read/write after SSL object in error state (CVE-2017-3737)
-
openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)
Red Hat would like to thank the OpenSSL project for reporting CVE-2016-6306 and CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360 Inc.) as the original reporter of CVE-2016-6306. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec() 1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks 1377594 - CVE-2016-6306 openssl: certificate message OOB reads 1393929 - CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication 1416852 - CVE-2017-3731 openssl: Truncated packet could crash via OOB read 1416856 - CVE-2017-3732 openssl: BN_mod_exp may produce incorrect results on x86_64 1509169 - CVE-2017-3736 openssl: bn_sqrx8x_internal carry bug on x86_64 1523504 - CVE-2017-3737 openssl: Read/write after SSL object in error state 1523510 - CVE-2017-3738 openssl: rsaz_1024_mul_avx2 overflow bug on x86_64
- JIRA issues fixed (https://issues.jboss.org/):
JBCS-372 - Errata for httpd 2.4.29 GA RHEL 6
- Package List:
Red Hat JBoss Core Services on RHEL 6 Server:
Source: jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el6.src.rpm jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.src.rpm jbcs-httpd24-apr-1.6.3-14.jbcs.el6.src.rpm jbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.src.rpm jbcs-httpd24-httpd-2.4.29-17.jbcs.el6.src.rpm jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.src.rpm jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.src.rpm jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.src.rpm jbcs-httpd24-mod_jk-1.2.43-1.redhat_1.jbcs.el6.src.rpm jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.src.rpm jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.src.rpm jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.src.rpm jbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.src.rpm
i386: jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.i686.rpm jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el6.i686.rpm jbcs-httpd24-apr-1.6.3-14.jbcs.el6.i686.rpm jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el6.i686.rpm jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el6.i686.rpm jbcs-httpd24-httpd-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.i686.rpm jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el6.i686.rpm jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.i686.rpm jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el6.i686.rpm jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.i686.rpm jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el6.i686.rpm jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el6.i686.rpm jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el6.i686.rpm jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el6.i686.rpm jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.i686.rpm jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el6.i686.rpm jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.i686.rpm jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el6.i686.rpm jbcs-httpd24-mod_session-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el6.i686.rpm jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.i686.rpm jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el6.i686.rpm jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el6.i686.rpm jbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.i686.rpm jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el6.i686.rpm jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el6.i686.rpm jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el6.i686.rpm jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el6.i686.rpm jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el6.i686.rpm
noarch: jbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el6.noarch.rpm jbcs-httpd24-httpd-manual-2.4.29-17.jbcs.el6.noarch.rpm
x86_64: jbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.x86_64.rpm jbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-1.6.3-14.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-devel-1.6.3-14.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el6.x86_64.rpm jbcs-httpd24-httpd-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_session-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el6.x86_64.rpm jbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.x86_64.rpm jbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el6.x86_64.rpm jbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el6.x86_64.rpm jbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.x86_64.rpm jbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el6.x86_64.rpm jbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el6.x86_64.rpm jbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el6.x86_64.rpm jbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el6.x86_64.rpm jbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el6.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2016-2182 https://access.redhat.com/security/cve/CVE-2016-6302 https://access.redhat.com/security/cve/CVE-2016-6306 https://access.redhat.com/security/cve/CVE-2016-7055 https://access.redhat.com/security/cve/CVE-2017-3731 https://access.redhat.com/security/cve/CVE-2017-3732 https://access.redhat.com/security/cve/CVE-2017-3736 https://access.redhat.com/security/cve/CVE-2017-3737 https://access.redhat.com/security/cve/CVE-2017-3738 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2018 Red Hat, Inc.
Here are the details from the Slackware 14.2 ChangeLog: +--------------------------+ patches/packages/openssl-1.0.2k-i586-1_slack14.2.txz: Upgraded. +--------------------------+
Where to find the new packages: +-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab (http://osuosl.org) for donating FTP and rsync hosting to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for additional mirror sites near you.
Updated packages for Slackware 14.2: ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-1.0.2k-i586-1_slack14.2.txz ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-solibs-1.0.2k-i586-1_slack14.2.txz
Updated packages for Slackware x86_64 14.2: ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-1.0.2k-x86_64-1_slack14.2.txz ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-solibs-1.0.2k-x86_64-1_slack14.2.txz
Updated packages for Slackware -current: ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.2k-i586-1.txz ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.2k-i586-1.txz
Updated packages for Slackware x86_64 -current: ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.2k-x86_64-1.txz ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.2k-x86_64-1.txz
MD5 signatures: +-------------+
Slackware 14.2 packages: 1d03d7f59dece41b97104cbe8341b812 openssl-1.0.2k-i586-1_slack14.2.txz c5e689d9ac1c1675c5059b8e7cd42594 openssl-solibs-1.0.2k-i586-1_slack14.2.txz
Slackware x86_64 14.2 packages: 5e075d516ab7ccc1ef14f430e599bdef openssl-1.0.2k-x86_64-1_slack14.2.txz 110479b47a4208bcdb43fee59b9f06ca openssl-solibs-1.0.2k-x86_64-1_slack14.2.txz
Slackware -current packages: 8eca7a113cf58688dc6203c4091fd0ac a/openssl-solibs-1.0.2k-i586-1.txz 1ee03441f6409e48dda42c006ae5a7ad n/openssl-1.0.2k-i586-1.txz
Slackware x86_64 -current packages: 51ed87062d6898bd50705b2c2abc2c68 a/openssl-solibs-1.0.2k-x86_64-1.txz d9e56ff59fd7aa5791bf6809ccea0f92 n/openssl-1.0.2k-x86_64-1.txz
Installation instructions: +------------------------+
Upgrade the packages as root:
upgradepkg openssl-1.0.2k-i586-1_slack14.2.txz openssl-solibs-1.0.2k-i586-1_slack14.2.txz
+-----+
Slackware Linux Security Team http://slackware.com/gpg-key security@slackware.com
+------------------------------------------------------------------------+ | To leave the slackware-security mailing list: | +------------------------------------------------------------------------+ | Send an email to majordomo@slackware.com with this text in the body of | | the email message: | | | | unsubscribe slackware-security | | | | You will get a confirmation message back containing instructions to | | complete the process. Please do not reply to this email address.
Background
A fast, multi-threaded, multi-user SQL database server.
Impact
A remote attacker could execute arbitrary code without authentication or cause a partial denial of service condition.
https://creativecommons.org/licenses/by-sa/2.5
.
Gentoo Linux Security Advisory GLSA 201702-07
https://security.gentoo.org/
Severity: Normal Title: OpenSSL: Multiple vulnerabilities Date: February 14, 2017 Bugs: #607318 ID: 201702-07
Synopsis
Multiple vulnerabilities have been found in OpenSSL, the worst of which might allow attackers to access sensitive information.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/openssl < 1.0.2k >= 1.0.2k
Description
Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details.
Impact
A remote attacker is able to crash applications linked against OpenSSL or could obtain sensitive private-key information via an attack against the Diffie-Hellman (DH) ciphersuite.
Resolution
All OpenSSL users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2k"
References
[ 1 ] CVE-2016-7055 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055 [ 2 ] CVE-2017-3730 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730 [ 3 ] CVE-2017-3731 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731 [ 4 ] CVE-2017-3732 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/201702-07
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2017 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
--6TxcaqolfH5V8d0tqHGgGlj1v2tmUA9I9--
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512
============================================================================= FreeBSD-SA-17:02.openssl Security Advisory The FreeBSD Project
Topic: OpenSSL multiple vulnerabilities
Category: contrib Module: openssl Announced: 2017-02-23 Affects: All supported versions of FreeBSD. Corrected: 2017-01-26 19:14:14 UTC (stable/11, 11.0-STABLE) 2017-02-23 07:11:48 UTC (releng/11.0, 11.0-RELEASE-p8) 2017-01-27 07:45:06 UTC (stable/10, 10.3-STABLE) 2017-02-23 07:12:18 UTC (releng/10.3, 10.3-RELEASE-p16) CVE Name: CVE-2016-7055, CVE-2017-3731, CVE-2017-3732
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit
I. Background
FreeBSD includes software from the OpenSSL Project. The OpenSSL Project is a collaborative effort to develop a robust, commercial-grade, full-featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols as well as a full-strength general purpose cryptography library.
II. Problem Description
If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. [CVE-2017-3732]
Montgomery multiplication may produce incorrect results. [CVE-2016-7055]
III. Impact
A remote attacker may trigger a crash on servers or clients that supported RC4-MD5. [CVE-2017-3732, CVE-2016-7055]
IV. Workaround
No workaround is available.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to a supported FreeBSD stable or release / security branch (releng) dated after the correction date.
Restart all daemons that use the library, or reboot the system.
2) To update your vulnerable system via a binary patch:
Systems running a RELEASE version of FreeBSD on the i386 or amd64 platforms can be updated via the freebsd-update(8) utility:
freebsd-update fetch
freebsd-update install
Restart all daemons that use the library, or reboot the system.
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
[FreeBSD 11.0]
fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-11.patch
fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-11.patch.asc
gpg --verify openssl-11.patch.asc
[FreeBSD 10.3]
fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-10.patch
fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-10.patch.asc
gpg --verify openssl-10.patch.asc
b) Apply the patch. Execute the following commands as root:
cd /usr/src
patch < /path/to/patch
c) Recompile the operating system using buildworld and installworld as
described in
Restart all daemons that use the library, or reboot the system.
VI. Correction details
The following list contains the correction revision numbers for each affected branch.
Branch/path Revision
stable/10/ r312863 releng/10.3/ r314125 stable/11/ r312826 releng/11.0/ r314126
To see which files were modified by a particular revision, run the following command, replacing NNNNNN with the revision number, on a machine with Subversion installed:
svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base
Or visit the following URL, replacing NNNNNN with the revision number:
VII. References
The latest revision of this advisory is available at
iQIzBAEBCgAdFiEEHPf/b631yp++G4yy7Wfs1l3PaucFAliujOsACgkQ7Wfs1l3P aufZHhAAy8U5oOrLGq0XH8Dumpkyc+bFOmsEh+S1hL6jFL13jUVpDqogZ3w/a7If Hcqiyipx5dbcGbHJayokfimkxPcIYydYQK9NwWaXVlnZifvgWka+KxtcD0u2A8S5 cpTbNl+CALQQqEF3+JmOc4Uq2Dtui0xFG1N5Og4oF5Uo+lvQh4bcJ1UbfhMdq8EG US3hGlJLJJW75m3jkgHyu0o7A0swnNTUQrW9Z0p/3iTiel7fM57d/N1who+kt59V UErXTzMDBT1kkWRne0aTA71gdy3SUeRiVi9/LWggjIRJNyMnQjO3UI2UOIHLLQAG CXcZLPekB87iHZxMAw8oV6b4GIkJhqUFW2ep2AZkUdDZ2Mup9bDrx/0Ik0jHjyQY KEmZDroHvP8z569q+aWfIIpMXPv6zJTnent45U2/q13wMHJwWsADu9ukeWKTw7wI P0Rc3vht+AXbXFi9SjxwdldgrVszV7x8Yi6W9KhHsGqCl6NBCW9Md/PWbNQQUVkq I5tV0WB3pTwOk0yMi3h/okM9VBr1lPDU18W0he5T9wbOh4w0jwFb8AqMu1slst3l 9MlhRfO/4LIDlfRQ/dj4dOfVLZqEd/xleax99yFXZUzibUYrOMlBxNaKvV80plwB Kg2Hr3DJuJa3599kNgXMCNV1lRIOJbJ9dRmX6B0YzMgvxKPIXY4= =8Jsr -----END PGP SIGNATURE-----
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201705-3649", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2h" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2i" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2f" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.1.0c" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "6.9.5" }, { "model": "node.js", "scope": "lte", "trust": 1.0, "vendor": "nodejs", "version": "6.8.1" }, { "model": "node.js", "scope": "lte", "trust": 1.0, "vendor": "nodejs", "version": "4.1.2" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2d" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "7.5.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "6.9.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "4.2.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2c" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "6.0.0" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.1.0b" }, { "model": "node.js", "scope": "lt", "trust": 1.0, "vendor": "nodejs", "version": "4.7.3" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.1.0a" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2b" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2e" }, { "model": "openssl", "scope": "eq", "trust": 1.0, "vendor": "openssl", "version": "1.0.2" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "7.0.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "4.0.0" }, { "model": "node.js", "scope": "gte", "trust": 1.0, "vendor": "nodejs", "version": "5.0.0" }, { "model": "node.js", "scope": "lte", "trust": 1.0, "vendor": "nodejs", "version": "5.12.0" }, { "model": "jp1/automatic job management system 3", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- manager web console" }, { "model": "jp1/integrated management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- service support starter edition" }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.1.0d" }, { "model": "jp1/it desktop management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "2 - operations director" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "(64)" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.1.0" }, { "model": "systemdirector enterprise", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "enterprisedirectoryserver", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "all versions" }, { "model": "job management partner 1/integrated management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- service support" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "foundation" }, { "model": "job management partner 1/it desktop management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "2 - smart device manager" }, { "model": "jp1/performance management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web console" }, { "model": "express5800", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "/sg all versions" }, { "model": "webotx enterprise service bus", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "openssl", "scope": "eq", "trust": 0.8, "vendor": "openssl", "version": "1.0.2k" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "(64)" }, { "model": "jp1/performance management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- manager" }, { "model": "jp1/it desktop management - manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/automatic operation", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "job management partner 1/performance management - web console", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "job management partner 1/it desktop management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "2 - manager" }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "st ard" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "jp1/it desktop management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "2 - smart device manager" }, { "model": "jp1/integrated management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- service support" }, { "model": "ucosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base" }, { "model": "ucosminexus primary server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "base(64)" }, { "model": "job management partner 1/integrated management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- service support advanced edition" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "it operations director", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/service support", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "jp1/operations analytics", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/service support", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "starter edition" }, { "model": "cosminexus http server", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "-r" }, { "model": "jp1/it desktop management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "2 - manager" }, { "model": "job management partner 1/it desktop management - manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service architect", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "express" }, { "model": "esmpro/serveragentservice", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "all versions (linux edition )" }, { "model": "jp1/performance management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- manager web console" }, { "model": "openssl", "scope": "lt", "trust": 0.8, "vendor": "openssl", "version": "1.0.2" }, { "model": "webotx portal", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "ucosminexus developer", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "webotx application server", "scope": "eq", "trust": 0.8, "vendor": "nec", "version": "enterprise" }, { "model": "jp1/integrated management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- service support advanced edition" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "db": "NVD", "id": "CVE-2017-3732" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:openssl:openssl", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:enterprise_directoryserver", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:esmpro_serveragent", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:esmpro_serveragentservice", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:express5800", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:systemdirector_enterprise", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:webotx_application_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:webotx_enterprise_service_bus", "vulnerable": true }, { "cpe22Uri": "cpe:/a:nec:webotx_portal", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:cosminexus_http_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:it_operations_director", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:job_management_partner_1_integrated_management", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:job_management_partner_1%2Fit_desktop_management-manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:job_management_partner_1_performance_management_web_console", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1_automatic_job_management_system_3", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1_automatic_operation", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1_integrated_management", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1_it_desktop_management", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1%2Fit_desktop_management-manager", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1_operation_analytics", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1_performance_management", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:jp1_service_support", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_application_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_developer", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_primary_server", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_service_architect", "vulnerable": true }, { "cpe22Uri": "cpe:/a:hitachi:ucosminexus_service_platform", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003156" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "148521" }, { "db": "PACKETSTORM", "id": "148525" } ], "trust": 0.2 }, "cve": "CVE-2017-3732", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 8.6, "id": "CVE-2017-3732", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.9, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "id": "CVE-2017-3732", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2017-3732", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-3732", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-3732", "trust": 0.8, "value": "Medium" }, { "author": "VULMON", "id": "CVE-2017-3732", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-3732" }, { "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "db": "NVD", "id": "CVE-2017-3732" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem. OpenSSL There is a service disruption ( crash ) There are vulnerabilities that are put into a state.Service operation interruption ( crash ) There is a possibility of being put into a state. \nOpenSSL Security Advisory [07 Dec 2017]\n========================================\n\nRead/write after SSL object in error state (CVE-2017-3737)\n==========================================================\n\nSeverity: Moderate\n\nOpenSSL 1.0.2 (starting from version 1.0.2b) introduced an \"error state\"\nmechanism. The intent was that if a fatal error occurred during a handshake then\nOpenSSL would move into the error state and would immediately fail if you\nattempted to continue the handshake. This works as designed for the explicit\nhandshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()),\nhowever due to a bug it does not work correctly if SSL_read() or SSL_write() is\ncalled directly. In that scenario, if the handshake fails then a fatal error\nwill be returned in the initial function call. If SSL_read()/SSL_write() is\nsubsequently called by the application for the same SSL object then it will\nsucceed and the data is passed without being decrypted/encrypted directly from\nthe SSL/TLS record layer. \n\nIn order to exploit this issue an application bug would have to be present that\nresulted in a call to SSL_read()/SSL_write() being issued after having already\nreceived a fatal error. \n\nThis issue does not affect OpenSSL 1.1.0. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2n\n\nThis issue was reported to OpenSSL on 10th November 2017 by David Benjamin\n(Google). The fix was proposed by David Benjamin and implemented by Matt Caswell\nof the OpenSSL development team. \n\nrsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)\n=========================================================\n\nSeverity: Low\n\nThere is an overflow bug in the AVX2 Montgomery multiplication procedure\nused in exponentiation with 1024-bit moduli. \n\nThis only affects processors that support the AVX2 but not ADX extensions\nlike Intel Haswell (4th generation). \n\nDue to the low severity of this issue we are not issuing a new release of\nOpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it\nbecomes available. The fix is also available in commit e502cc86d in the OpenSSL\ngit repository. \n\nOpenSSL 1.0.2 users should upgrade to 1.0.2n\n\nThis issue was reported to OpenSSL on 22nd November 2017 by David Benjamin\n(Google). The issue was originally found via the OSS-Fuzz project. The fix was\ndeveloped by Andy Polyakov of the OpenSSL development team. \n\nNote\n====\n\nSupport for version 1.0.1 ended on 31st December 2016. Support for versions\n0.9.8 and 1.0.0 ended on 31st December 2015. Those versions are no longer\nreceiving security updates. \n\nReferences\n==========\n\nURL for this Security Advisory:\nhttps://www.openssl.org/news/secadv/20171207.txt\n\nNote: the online version of the advisory may be updated with additional details\nover time. \n\nFor details of OpenSSL severity classifications please see:\nhttps://www.openssl.org/policies/secpolicy.html\n. \nOpenSSL Security Advisory [27 Mar 2018]\n========================================\n\nConstructed ASN.1 types with a recursive definition could exceed the stack (CVE-2018-0739)\n==========================================================================================\n\nSeverity: Moderate\n\nConstructed ASN.1 types with a recursive definition (such as can be found in\nPKCS7) could eventually exceed the stack given malicious input with\nexcessive recursion. This could result in a Denial Of Service attack. There are\nno such structures used within SSL/TLS that come from untrusted sources so this\nis considered safe. \n\nIncorrect CRYPTO_memcmp on HP-UX PA-RISC (CVE-2018-0733)\n========================================================\n\nSeverity: Moderate\n\nBecause of an implementation bug the PA-RISC CRYPTO_memcmp function is\neffectively reduced to only comparing the least significant bit of each byte. \nThis allows an attacker to forge messages that would be considered as\nauthenticated in an amount of tries lower than that guaranteed by the security\nclaims of the scheme. The module can only be compiled by the HP-UX assembler, so\nthat only HP-UX PA-RISC targets are affected. Solution:\n\nThe References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss Web Server installation (including all applications\nand configuration files). \n\nAfter installing the updated packages, the httpd daemon will be restarted\nautomatically. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 6 security update\nAdvisory ID: RHSA-2018:2186-01\nProduct: Red Hat JBoss Core Services\nAdvisory URL: https://access.redhat.com/errata/RHSA-2018:2186\nIssue date: 2018-07-12\nCVE Names: CVE-2016-2182 CVE-2016-6302 CVE-2016-6306\n CVE-2016-7055 CVE-2017-3731 CVE-2017-3732\n CVE-2017-3736 CVE-2017-3737 CVE-2017-3738\n====================================================================\n1. Summary:\n\nRed Hat JBoss Core Services Pack Apache Server 2.4.29 packages are now\navailable for Red Hat Enterprise Linux 6. \n\nRed Hat Product Security has rated this release as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section. Relevant releases/architectures:\n\nRed Hat JBoss Core Services on RHEL 6 Server - i386, noarch, x86_64\n\n3. Description:\n\nThis release adds the new Apache HTTP Server 2.4.29 packages that are part\nof the JBoss Core Services offering. \n\nThis release serves as a replacement for Red Hat JBoss Core Services\nApache HTTP Server 2.4.23, and includes bug fixes and enhancements. Refer\nto the Release Notes for information on the most significant bug fixes,\nenhancements and component upgrades included in this release. \n\nThis release upgrades OpenSSL to version 1.0.2.n\n\nSecurity Fix(es):\n\n* openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()\n(CVE-2016-2182)\n\n* openssl: Insufficient TLS session ticket HMAC length checks\n(CVE-2016-6302)\n\n* openssl: certificate message OOB reads (CVE-2016-6306)\n\n* openssl: Carry propagating bug in Montgomery multiplication\n(CVE-2016-7055)\n\n* openssl: Truncated packet could crash via OOB read (CVE-2017-3731)\n\n* openssl: BN_mod_exp may produce incorrect results on x86_64\n(CVE-2017-3732)\n\n* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736)\n\n* openssl: Read/write after SSL object in error state (CVE-2017-3737)\n\n* openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738)\n\nRed Hat would like to thank the OpenSSL project for reporting CVE-2016-6306\nand CVE-2016-7055. Upstream acknowledges Shi Lei (Gear Team of Qihoo 360\nInc.) as the original reporter of CVE-2016-6306. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1367340 - CVE-2016-2182 openssl: Out-of-bounds write caused by unchecked errors in BN_bn2dec()\n1369855 - CVE-2016-6302 openssl: Insufficient TLS session ticket HMAC length checks\n1377594 - CVE-2016-6306 openssl: certificate message OOB reads\n1393929 - CVE-2016-7055 openssl: Carry propagating bug in Montgomery multiplication\n1416852 - CVE-2017-3731 openssl: Truncated packet could crash via OOB read\n1416856 - CVE-2017-3732 openssl: BN_mod_exp may produce incorrect results on x86_64\n1509169 - CVE-2017-3736 openssl: bn_sqrx8x_internal carry bug on x86_64\n1523504 - CVE-2017-3737 openssl: Read/write after SSL object in error state\n1523510 - CVE-2017-3738 openssl: rsaz_1024_mul_avx2 overflow bug on x86_64\n\n6. JIRA issues fixed (https://issues.jboss.org/):\n\nJBCS-372 - Errata for httpd 2.4.29 GA RHEL 6\n\n7. Package List:\n\nRed Hat JBoss Core Services on RHEL 6 Server:\n\nSource:\njbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el6.src.rpm\njbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.src.rpm\njbcs-httpd24-apr-1.6.3-14.jbcs.el6.src.rpm\njbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.src.rpm\njbcs-httpd24-httpd-2.4.29-17.jbcs.el6.src.rpm\njbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.src.rpm\njbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.src.rpm\njbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.src.rpm\njbcs-httpd24-mod_jk-1.2.43-1.redhat_1.jbcs.el6.src.rpm\njbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.src.rpm\njbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.src.rpm\njbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.src.rpm\njbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.src.rpm\n\ni386:\njbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.i686.rpm\njbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el6.i686.rpm\njbcs-httpd24-apr-1.6.3-14.jbcs.el6.i686.rpm\njbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el6.i686.rpm\njbcs-httpd24-apr-devel-1.6.3-14.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el6.i686.rpm\njbcs-httpd24-httpd-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.i686.rpm\njbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el6.i686.rpm\njbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.i686.rpm\njbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el6.i686.rpm\njbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.i686.rpm\njbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el6.i686.rpm\njbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el6.i686.rpm\njbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el6.i686.rpm\njbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el6.i686.rpm\njbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.i686.rpm\njbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el6.i686.rpm\njbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.i686.rpm\njbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el6.i686.rpm\njbcs-httpd24-mod_session-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el6.i686.rpm\njbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.i686.rpm\njbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el6.i686.rpm\njbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el6.i686.rpm\njbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.i686.rpm\njbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el6.i686.rpm\njbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el6.i686.rpm\njbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el6.i686.rpm\njbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el6.i686.rpm\njbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el6.i686.rpm\n\nnoarch:\njbcs-httpd24-apache-commons-daemon-1.1.0-1.redhat_2.1.jbcs.el6.noarch.rpm\njbcs-httpd24-httpd-manual-2.4.29-17.jbcs.el6.noarch.rpm\n\nx86_64:\njbcs-httpd24-apache-commons-daemon-jsvc-1.1.0-1.redhat_2.jbcs.el6.x86_64.rpm\njbcs-httpd24-apache-commons-daemon-jsvc-debuginfo-1.1.0-1.redhat_2.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-1.6.3-14.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-debuginfo-1.6.3-14.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-devel-1.6.3-14.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-debuginfo-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-devel-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-ldap-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-mysql-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-nss-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-odbc-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-openssl-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-pgsql-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-apr-util-sqlite-1.6.1-9.jbcs.el6.x86_64.rpm\njbcs-httpd24-httpd-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-httpd-debuginfo-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-httpd-devel-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-httpd-selinux-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-httpd-tools-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_auth_kerb-5.4-36.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_auth_kerb-debuginfo-5.4-36.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_bmx-0.9.6-17.GA.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_bmx-debuginfo-0.9.6-17.GA.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_cluster-native-1.3.8-1.Final_redhat_2.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_cluster-native-debuginfo-1.3.8-1.Final_redhat_2.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_jk-ap24-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_jk-debuginfo-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_jk-manual-1.2.43-1.redhat_1.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_ldap-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_proxy_html-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_rt-2.4.1-19.GA.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_rt-debuginfo-2.4.1-19.GA.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_security-2.9.1-23.GA.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_security-debuginfo-2.9.1-23.GA.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_session-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-mod_ssl-2.4.29-17.jbcs.el6.x86_64.rpm\njbcs-httpd24-nghttp2-1.29.0-8.jbcs.el6.x86_64.rpm\njbcs-httpd24-nghttp2-debuginfo-1.29.0-8.jbcs.el6.x86_64.rpm\njbcs-httpd24-nghttp2-devel-1.29.0-8.jbcs.el6.x86_64.rpm\njbcs-httpd24-openssl-1.0.2n-11.jbcs.el6.x86_64.rpm\njbcs-httpd24-openssl-debuginfo-1.0.2n-11.jbcs.el6.x86_64.rpm\njbcs-httpd24-openssl-devel-1.0.2n-11.jbcs.el6.x86_64.rpm\njbcs-httpd24-openssl-libs-1.0.2n-11.jbcs.el6.x86_64.rpm\njbcs-httpd24-openssl-perl-1.0.2n-11.jbcs.el6.x86_64.rpm\njbcs-httpd24-openssl-static-1.0.2n-11.jbcs.el6.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n8. References:\n\nhttps://access.redhat.com/security/cve/CVE-2016-2182\nhttps://access.redhat.com/security/cve/CVE-2016-6302\nhttps://access.redhat.com/security/cve/CVE-2016-6306\nhttps://access.redhat.com/security/cve/CVE-2016-7055\nhttps://access.redhat.com/security/cve/CVE-2017-3731\nhttps://access.redhat.com/security/cve/CVE-2017-3732\nhttps://access.redhat.com/security/cve/CVE-2017-3736\nhttps://access.redhat.com/security/cve/CVE-2017-3737\nhttps://access.redhat.com/security/cve/CVE-2017-3738\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/\n\n9. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2018 Red Hat, Inc. \n\n\nHere are the details from the Slackware 14.2 ChangeLog:\n+--------------------------+\npatches/packages/openssl-1.0.2k-i586-1_slack14.2.txz: Upgraded. \n+--------------------------+\n\n\nWhere to find the new packages:\n+-----------------------------+\n\nThanks to the friendly folks at the OSU Open Source Lab\n(http://osuosl.org) for donating FTP and rsync hosting\nto the Slackware project! :-)\n\nAlso see the \"Get Slack\" section on http://slackware.com for\nadditional mirror sites near you. \n\nUpdated packages for Slackware 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-1.0.2k-i586-1_slack14.2.txz\nftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/openssl-solibs-1.0.2k-i586-1_slack14.2.txz\n\nUpdated packages for Slackware x86_64 14.2:\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-1.0.2k-x86_64-1_slack14.2.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/openssl-solibs-1.0.2k-x86_64-1_slack14.2.txz\n\nUpdated packages for Slackware -current:\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/a/openssl-solibs-1.0.2k-i586-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/openssl-1.0.2k-i586-1.txz\n\nUpdated packages for Slackware x86_64 -current:\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/a/openssl-solibs-1.0.2k-x86_64-1.txz\nftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/openssl-1.0.2k-x86_64-1.txz\n\n\nMD5 signatures:\n+-------------+\n\nSlackware 14.2 packages:\n1d03d7f59dece41b97104cbe8341b812 openssl-1.0.2k-i586-1_slack14.2.txz\nc5e689d9ac1c1675c5059b8e7cd42594 openssl-solibs-1.0.2k-i586-1_slack14.2.txz\n\nSlackware x86_64 14.2 packages:\n5e075d516ab7ccc1ef14f430e599bdef openssl-1.0.2k-x86_64-1_slack14.2.txz\n110479b47a4208bcdb43fee59b9f06ca openssl-solibs-1.0.2k-x86_64-1_slack14.2.txz\n\nSlackware -current packages:\n8eca7a113cf58688dc6203c4091fd0ac a/openssl-solibs-1.0.2k-i586-1.txz\n1ee03441f6409e48dda42c006ae5a7ad n/openssl-1.0.2k-i586-1.txz\n\nSlackware x86_64 -current packages:\n51ed87062d6898bd50705b2c2abc2c68 a/openssl-solibs-1.0.2k-x86_64-1.txz\nd9e56ff59fd7aa5791bf6809ccea0f92 n/openssl-1.0.2k-x86_64-1.txz\n\n\nInstallation instructions:\n+------------------------+\n\nUpgrade the packages as root:\n# upgradepkg openssl-1.0.2k-i586-1_slack14.2.txz openssl-solibs-1.0.2k-i586-1_slack14.2.txz \n\n\n+-----+\n\nSlackware Linux Security Team\nhttp://slackware.com/gpg-key\nsecurity@slackware.com\n\n+------------------------------------------------------------------------+\n| To leave the slackware-security mailing list: |\n+------------------------------------------------------------------------+\n| Send an email to majordomo@slackware.com with this text in the body of |\n| the email message: |\n| |\n| unsubscribe slackware-security |\n| |\n| You will get a confirmation message back containing instructions to |\n| complete the process. Please do not reply to this email address. \n\nBackground\n==========\n\nA fast, multi-threaded, multi-user SQL database server. \n\nImpact\n======\n\nA remote attacker could execute arbitrary code without authentication\nor cause a partial denial of service condition. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n\n. \n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201702-07\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: OpenSSL: Multiple vulnerabilities\n Date: February 14, 2017\n Bugs: #607318\n ID: 201702-07\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in OpenSSL, the worst of which\nmight allow attackers to access sensitive information. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-libs/openssl \u003c 1.0.2k \u003e= 1.0.2k\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in OpenSSL. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker is able to crash applications linked against OpenSSL\nor could obtain sensitive private-key information via an attack against\nthe Diffie-Hellman (DH) ciphersuite. \n\nResolution\n==========\n\nAll OpenSSL users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-libs/openssl-1.0.2k\"\n\nReferences\n==========\n\n[ 1 ] CVE-2016-7055\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7055\n[ 2 ] CVE-2017-3730\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3730\n[ 3 ] CVE-2017-3731\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3731\n[ 4 ] CVE-2017-3732\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3732\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/201702-07\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2017 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n\n\n--6TxcaqolfH5V8d0tqHGgGlj1v2tmUA9I9--\n\n. \n-----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA512\n\n=============================================================================\nFreeBSD-SA-17:02.openssl Security Advisory\n The FreeBSD Project\n\nTopic: OpenSSL multiple vulnerabilities\n\nCategory: contrib\nModule: openssl\nAnnounced: 2017-02-23\nAffects: All supported versions of FreeBSD. \nCorrected: 2017-01-26 19:14:14 UTC (stable/11, 11.0-STABLE)\n 2017-02-23 07:11:48 UTC (releng/11.0, 11.0-RELEASE-p8)\n 2017-01-27 07:45:06 UTC (stable/10, 10.3-STABLE)\n 2017-02-23 07:12:18 UTC (releng/10.3, 10.3-RELEASE-p16)\nCVE Name: CVE-2016-7055, CVE-2017-3731, CVE-2017-3732\n\nFor general information regarding FreeBSD Security Advisories,\nincluding descriptions of the fields above, security branches, and the\nfollowing sections, please visit \u003cURL:https://security.FreeBSD.org/\u003e. \n\nI. Background\n\nFreeBSD includes software from the OpenSSL Project. The OpenSSL Project is\na collaborative effort to develop a robust, commercial-grade, full-featured\nOpen Source toolkit implementing the Secure Sockets Layer (SSL v2/v3)\nand Transport Layer Security (TLS v1) protocols as well as a full-strength\ngeneral purpose cryptography library. \n\nII. Problem Description\n\nIf an SSL/TLS server or client is running on a 32-bit host, and a specific\ncipher is being used, then a truncated packet can cause that server or\nclient to perform an out-of-bounds read, usually resulting in a crash. [CVE-2017-3732]\n\nMontgomery multiplication may produce incorrect results. [CVE-2016-7055]\n\nIII. Impact\n\nA remote attacker may trigger a crash on servers or clients that supported\nRC4-MD5. [CVE-2017-3732,\nCVE-2016-7055]\n\nIV. Workaround\n\nNo workaround is available. \n\nV. Solution\n\nPerform one of the following:\n\n1) Upgrade your vulnerable system to a supported FreeBSD stable or\nrelease / security branch (releng) dated after the correction date. \n\nRestart all daemons that use the library, or reboot the system. \n\n2) To update your vulnerable system via a binary patch:\n\nSystems running a RELEASE version of FreeBSD on the i386 or amd64\nplatforms can be updated via the freebsd-update(8) utility:\n\n# freebsd-update fetch\n# freebsd-update install\n\nRestart all daemons that use the library, or reboot the system. \n\n3) To update your vulnerable system via a source code patch:\n\nThe following patches have been verified to apply to the applicable\nFreeBSD release branches. \n\na) Download the relevant patch from the location below, and verify the\ndetached PGP signature using your PGP utility. \n\n[FreeBSD 11.0]\n# fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-11.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-11.patch.asc\n# gpg --verify openssl-11.patch.asc\n\n[FreeBSD 10.3]\n# fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-10.patch\n# fetch https://security.FreeBSD.org/patches/SA-17:02/openssl-10.patch.asc\n# gpg --verify openssl-10.patch.asc\n\nb) Apply the patch. Execute the following commands as root:\n\n# cd /usr/src\n# patch \u003c /path/to/patch\n\nc) Recompile the operating system using buildworld and installworld as\ndescribed in \u003cURL:https://www.FreeBSD.org/handbook/makeworld.html\u003e. \n\nRestart all daemons that use the library, or reboot the system. \n\nVI. Correction details\n\nThe following list contains the correction revision numbers for each\naffected branch. \n\nBranch/path Revision\n- -------------------------------------------------------------------------\nstable/10/ r312863\nreleng/10.3/ r314125\nstable/11/ r312826\nreleng/11.0/ r314126\n- -------------------------------------------------------------------------\n\nTo see which files were modified by a particular revision, run the\nfollowing command, replacing NNNNNN with the revision number, on a\nmachine with Subversion installed:\n\n# svn diff -cNNNNNN --summarize svn://svn.freebsd.org/base\n\nOr visit the following URL, replacing NNNNNN with the revision number:\n\n\u003cURL:https://svnweb.freebsd.org/base?view=revision\u0026revision=NNNNNN\u003e\n\nVII. References\n\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7055\u003e \n\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731\u003e \n\n\u003cURL:https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3732\u003e\n\n\u003cURL:https://www.openssl.org/news/secadv/20170126.txt\u003e\n\nThe latest revision of this advisory is available at\n\u003cURL:https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc\u003e\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.1.18 (FreeBSD)\n\niQIzBAEBCgAdFiEEHPf/b631yp++G4yy7Wfs1l3PaucFAliujOsACgkQ7Wfs1l3P\naufZHhAAy8U5oOrLGq0XH8Dumpkyc+bFOmsEh+S1hL6jFL13jUVpDqogZ3w/a7If\nHcqiyipx5dbcGbHJayokfimkxPcIYydYQK9NwWaXVlnZifvgWka+KxtcD0u2A8S5\ncpTbNl+CALQQqEF3+JmOc4Uq2Dtui0xFG1N5Og4oF5Uo+lvQh4bcJ1UbfhMdq8EG\nUS3hGlJLJJW75m3jkgHyu0o7A0swnNTUQrW9Z0p/3iTiel7fM57d/N1who+kt59V\nUErXTzMDBT1kkWRne0aTA71gdy3SUeRiVi9/LWggjIRJNyMnQjO3UI2UOIHLLQAG\nCXcZLPekB87iHZxMAw8oV6b4GIkJhqUFW2ep2AZkUdDZ2Mup9bDrx/0Ik0jHjyQY\nKEmZDroHvP8z569q+aWfIIpMXPv6zJTnent45U2/q13wMHJwWsADu9ukeWKTw7wI\nP0Rc3vht+AXbXFi9SjxwdldgrVszV7x8Yi6W9KhHsGqCl6NBCW9Md/PWbNQQUVkq\nI5tV0WB3pTwOk0yMi3h/okM9VBr1lPDU18W0he5T9wbOh4w0jwFb8AqMu1slst3l\n9MlhRfO/4LIDlfRQ/dj4dOfVLZqEd/xleax99yFXZUzibUYrOMlBxNaKvV80plwB\nKg2Hr3DJuJa3599kNgXMCNV1lRIOJbJ9dRmX6B0YzMgvxKPIXY4=\n=8Jsr\n-----END PGP SIGNATURE-----\n", "sources": [ { "db": "NVD", "id": "CVE-2017-3732" }, { "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "db": "VULMON", "id": "CVE-2017-3732" }, { "db": "PACKETSTORM", "id": "169655" }, { "db": "PACKETSTORM", "id": "169626" }, { "db": "PACKETSTORM", "id": "148521" }, { "db": "PACKETSTORM", "id": "148525" }, { "db": "PACKETSTORM", "id": "141025" }, { "db": "PACKETSTORM", "id": "146486" }, { "db": "PACKETSTORM", "id": "141088" }, { "db": "PACKETSTORM", "id": "141255" } ], "trust": 2.43 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-3732", "trust": 2.7 }, { "db": "SECTRACK", "id": "1037717", "trust": 1.1 }, { "db": "BID", "id": "95814", "trust": 1.1 }, { "db": "TENABLE", "id": "TNS-2017-04", "trust": 1.1 }, { "db": "JVN", "id": "JVNVU92830136", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-003156", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2017-3732", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169655", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169626", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148521", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "148525", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141025", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "146486", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141088", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "141255", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-3732" }, { "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "db": "PACKETSTORM", "id": "169655" }, { "db": "PACKETSTORM", "id": "169626" }, { "db": "PACKETSTORM", "id": "148521" }, { "db": "PACKETSTORM", "id": "148525" }, { "db": "PACKETSTORM", "id": "141025" }, { "db": "PACKETSTORM", "id": "146486" }, { "db": "PACKETSTORM", "id": "141088" }, { "db": "PACKETSTORM", "id": "141255" }, { "db": "NVD", "id": "CVE-2017-3732" } ] }, "id": "VAR-201705-3649", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.206875005 }, "last_update_date": "2024-11-29T22:01:35.644000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "hitachi-sec-2018-103", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2018-103/index.html" }, { "title": "hitachi-sec-2017-115", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2017-115/index.html" }, { "title": "NV17-011", "trust": 0.8, "url": "http://jpn.nec.com/security-info/secinfo/nv17-011.html" }, { "title": "BN_mod_exp may produce incorrect results on x86_64", "trust": 0.8, "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "title": "hitachi-sec-2018-103", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/hitachi-sec-2018-103/index.html" }, { "title": "hitachi-sec-2017-115", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/soft1/security/info/vuls/hitachi-sec-2017-115/index.html" }, { "title": "The Register", "trust": 0.2, "url": "https://www.theregister.co.uk/2017/01/31/openssl_patches/" }, { "title": "Red Hat: Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 7 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182185 - Security Advisory" }, { "title": "Red Hat: Important: java-1.8.0-ibm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182575 - Security Advisory" }, { "title": "Red Hat: Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 RHEL 6 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182186 - Security Advisory" }, { "title": "Red Hat: Moderate: java-1.8.0-ibm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182713 - Security Advisory" }, { "title": "Red Hat: Important: java-1.8.0-ibm security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182568 - Security Advisory" }, { "title": "Red Hat: Moderate: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 security update", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories\u0026qid=RHSA-20182187 - Security Advisory" }, { "title": "Red Hat: CVE-2017-3732", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2017-3732" }, { "title": "Arch Linux Issues: ", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2017-3732" }, { "title": "IBM: Security Bulletin: OpenSSL vulnerabilites impacting IBM Aspera Connect 3.7.4 and earlier (CVE-2017-3732, CVE-2016-7055)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=030cb7ac9266aec85453c1d2339fbc00" }, { "title": "Ubuntu Security Notice: openssl vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3181-1" }, { "title": "Arch Linux Advisories: [ASA-201701-37] openssl: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201701-37" }, { "title": "Huawei Security Advisories: Security Advisory - Three OpenSSL Vulnerabilities in Huawei Products", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=huawei_security_advisories\u0026qid=1181e052a6a83786d4182d45ddb56d5d" }, { "title": "Symantec Security Advisories: SA141 : OpenSSL Vulnerabilities 26-Jan-2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=symantec_security_advisories\u0026qid=117bc0d26e74d755d85acf15af842eaf" }, { "title": "Arch Linux Advisories: [ASA-201701-36] lib32-openssl: multiple issues", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_advisories\u0026qid=ASA-201701-36" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Spectrum Protect Operations Center and Client Management Service (CVE-2016-0705, CVE-2017-3732, CVE-2017-3736, CVE-2018-1656, CVE-2018-12539)", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=3d9ab13c871ea2142681c7977b25c5ff" }, { "title": "IBM: IBM Security Bulletin: IBM SDK, Java Technology Edition Quarterly CPU \u2013 Jul 2018 \u2013 Includes Oracle Jul 2018 CPU affects DB2 Recovery Expert for Linux, Unix and Windows", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=af4ddb95056d65a4af347aec0f652f0e" }, { "title": "Cisco: Multiple Vulnerabilities in OpenSSL Affecting Cisco Products: January and February 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts\u0026qid=cisco-sa-20170130-openssl" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java Runtime affect IBM Cognos Planning", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=62ef85c9034c17315b7d0a712483c5ea" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect Rational Reporting for Development Intelligence", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=03b0267d78cd8ac1bbb43afc737474f0" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affects IBM InfoSphere Information Server", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=63bbfc68418161b36080acd59a541d45" }, { "title": "IBM: IBM Security Bulletin: Multiple vulnerabilities in IBM Java SDK affect IBM Security Privileged Identity Manager", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=42a34f9348fc5f34065c6d25764eb2a2" }, { "title": "Debian CVElist Bug Report Logs: Security fixes from the July 2017 CPU", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=adc1e0c986afd5f2f3b0797ba936d072" }, { "title": "IBM: IBM Security Bulletin: IBM Cognos Controller 2019Q2 Security Updater: Multiple vulnerabilities have been identified in IBM Cognos Controller", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=38227211accce022b0a3d9b56a974186" }, { "title": "Forcepoint Security Advisories: CVE-2017-3730, -3731, -3732 OpenSSL Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=forcepoint_security_advisories\u0026qid=16a227df38f44014c9520f3b6cb5344e" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=a2bac27fb002bed513645d4775c7275b" }, { "title": "Tenable Security Advisories: [R5] SecurityCenter 5.4.3 Fixes Multiple Vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=tenable_security_advisories\u0026qid=TNS-2017-04" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - April 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=a31bff03e9909229fd67996884614fdf" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=2f446a7e1ea263c0c3a365776c6713f2" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=5f8c525f1408011628af1792207b2099" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - July 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=586e6062440cdd312211d748e028164e" }, { "title": "IBM: IBM Security Bulletin: IBM Security Privileged Identity Manager is affected by multiple vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=dd8c9d5928cc3b1ac8c35b4b24703e38" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - April 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=143b3fb255063c81571469eaa3cf0a87" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=523d3f220a64ff01dd95e064bd37566a" }, { "title": "Oracle: Oracle Critical Patch Update Advisory - January 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_advisories\u0026qid=e2a7f287e9acc8c64ab3df71130bc64d" }, { "title": "IBM: Security Bulletin: Multiple vulnerabilities in IBM Java affect IBM Netezza Analytics for NPS", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=c36fc403a4c2c6439b732d2fca738f58" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - January 2018", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=525e4e31765e47b9e53b24e880af9d6e" }, { "title": "Oracle Solaris Third Party Bulletins: Oracle Solaris Third Party Bulletin - October 2017", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=oracle_solaris_third_party_bulletins\u0026qid=6283337cd31f81f24d445925f2138c0e" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-3732" }, { "db": "JVNDB", "id": "JVNDB-2017-003156" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "db": "NVD", "id": "CVE-2017-3732" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.6, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3732" }, { "trust": 1.2, "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "trust": 1.2, "url": "https://security.gentoo.org/glsa/201702-07" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2187" }, { "trust": 1.2, "url": "https://access.redhat.com/errata/rhsa-2018:2186" }, { "trust": 1.1, "url": "http://www.securityfocus.com/bid/95814" }, { "trust": 1.1, "url": "http://www.securitytracker.com/id/1037717" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "trust": 1.1, "url": "https://www.tenable.com/security/tns-2017-04" }, { "trust": 1.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-17:02.openssl.asc" }, { "trust": 1.1, "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "trust": 1.1, "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2018:2185" }, { "trust": 1.1, "url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-hpesbhf03838en_us" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2018:2568" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2018:2575" }, { "trust": 1.1, "url": "https://access.redhat.com/errata/rhsa-2018:2713" }, { "trust": 1.1, "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3732" }, { "trust": 0.8, "url": "https://jvn.jp/vu/jvnvu92830136/" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3731" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-7055" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3738" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3736" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3737" }, { "trust": 0.2, "url": "https://www.openssl.org/policies/secpolicy.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-0701" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2015-3193" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-2182" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6302" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-3731" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-3737" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-6306" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-3738" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-3732" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-6306" }, { "trust": 0.2, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.2, "url": "https://access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.29/" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-2182" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-7055" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-6302" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2017-3736" }, { "trust": 0.2, "url": "https://bugs.gentoo.org." }, { "trust": 0.2, "url": "https://security.gentoo.org/" }, { "trust": 0.2, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/200.html" }, { "trust": 0.1, "url": "https://tools.cisco.com/security/center/viewalert.x?alertid=52438" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/3181-1/" }, { "trust": 0.1, "url": "https://www.openssl.org/news/secadv/20171207.txt" }, { "trust": 0.1, "url": "https://www.openssl.org/news/secadv/20180327.txt" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0739" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-0733" }, { "trust": 0.1, "url": "https://issues.jboss.org/):" }, { "trust": 0.1, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7055" }, { "trust": 0.1, "url": "http://slackware.com" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3731" }, { "trust": 0.1, "url": "http://osuosl.org)" }, { "trust": 0.1, "url": "http://slackware.com/gpg-key" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2645" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3653" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10227" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3635" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3637" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3634" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3648" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2591" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2668" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3456" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3652" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10379" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10314" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10268" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3452" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2622" }, { "trust": 0.1, "url": "https://security.gentoo.org/glsa/201802-04" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3329" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2590" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3649" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3450" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10283" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10286" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2647" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3651" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3647" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3462" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2583" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3309" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2612" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2703" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3308" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2640" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3636" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3461" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10276" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2696" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10378" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10384" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2562" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2665" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3453" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-2573" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3464" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3633" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3599" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-10155" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3641" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3600" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3463" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-3730" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3732" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3731" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2017-3730" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2016-7055" }, { "trust": 0.1, "url": "https://www.freebsd.org/handbook/makeworld.html\u003e." }, { "trust": 0.1, "url": "https://security.freebsd.org/\u003e." }, { "trust": 0.1, "url": "https://www.openssl.org/news/secadv/20170126.txt\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-17:02/openssl-11.patch.asc" }, { "trust": 0.1, "url": "https://security.freebsd.org/advisories/freebsd-sa-17:02.openssl.asc\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-17:02/openssl-11.patch" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-17:02/openssl-10.patch" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3732\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3731\u003e" }, { "trust": 0.1, "url": "https://security.freebsd.org/patches/sa-17:02/openssl-10.patch.asc" }, { "trust": 0.1, "url": "https://svnweb.freebsd.org/base?view=revision\u0026revision=nnnnnn\u003e" }, { "trust": 0.1, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-7055\u003e" } ], "sources": [ { "db": "VULMON", "id": "CVE-2017-3732" }, { "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "db": "PACKETSTORM", "id": "169655" }, { "db": "PACKETSTORM", "id": "169626" }, { "db": "PACKETSTORM", "id": "148521" }, { "db": "PACKETSTORM", "id": "148525" }, { "db": "PACKETSTORM", "id": "141025" }, { "db": "PACKETSTORM", "id": "146486" }, { "db": "PACKETSTORM", "id": "141088" }, { "db": "PACKETSTORM", "id": "141255" }, { "db": "NVD", "id": "CVE-2017-3732" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2017-3732" }, { "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "db": "PACKETSTORM", "id": "169655" }, { "db": "PACKETSTORM", "id": "169626" }, { "db": "PACKETSTORM", "id": "148521" }, { "db": "PACKETSTORM", "id": "148525" }, { "db": "PACKETSTORM", "id": "141025" }, { "db": "PACKETSTORM", "id": "146486" }, { "db": "PACKETSTORM", "id": "141088" }, { "db": "PACKETSTORM", "id": "141255" }, { "db": "NVD", "id": "CVE-2017-3732" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-05-04T00:00:00", "db": "VULMON", "id": "CVE-2017-3732" }, { "date": "2017-05-18T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "date": "2017-12-07T12:12:12", "db": "PACKETSTORM", "id": "169655" }, { "date": "2018-03-27T12:12:12", "db": "PACKETSTORM", "id": "169626" }, { "date": "2018-07-12T21:45:18", "db": "PACKETSTORM", "id": "148521" }, { "date": "2018-07-12T21:48:57", "db": "PACKETSTORM", "id": "148525" }, { "date": "2017-02-13T16:38:20", "db": "PACKETSTORM", "id": "141025" }, { "date": "2018-02-20T14:04:53", "db": "PACKETSTORM", "id": "146486" }, { "date": "2017-02-14T17:07:17", "db": "PACKETSTORM", "id": "141088" }, { "date": "2017-02-23T17:14:20", "db": "PACKETSTORM", "id": "141255" }, { "date": "2017-05-04T19:29:00.400000", "db": "NVD", "id": "CVE-2017-3732" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-08-29T00:00:00", "db": "VULMON", "id": "CVE-2017-3732" }, { "date": "2018-02-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-003156" }, { "date": "2024-11-21T03:26:01.593000", "db": "NVD", "id": "CVE-2017-3732" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "148525" }, { "db": "PACKETSTORM", "id": "146486" } ], "trust": 0.2 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "OpenSSL Service disruption in (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-003156" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "sql injection", "sources": [ { "db": "PACKETSTORM", "id": "148525" } ], "trust": 0.1 } }
gsd-2017-3732
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2017-3732", "description": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "id": "GSD-2017-3732", "references": [ "https://www.suse.com/security/cve/CVE-2017-3732.html", "https://access.redhat.com/errata/RHSA-2018:2713", "https://access.redhat.com/errata/RHSA-2018:2575", "https://access.redhat.com/errata/RHSA-2018:2568", "https://access.redhat.com/errata/RHSA-2018:2187", "https://access.redhat.com/errata/RHSA-2018:2186", "https://access.redhat.com/errata/RHSA-2018:2185", "https://ubuntu.com/security/CVE-2017-3732", "https://advisories.mageia.org/CVE-2017-3732.html", "https://security.archlinux.org/CVE-2017-3732" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-3732" ], "details": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "id": "GSD-2017-3732", "modified": "2023-12-13T01:21:16.517460Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "DATE_PUBLIC": "2017-01-26", "ID": "CVE-2017-3732", "STATE": "PUBLIC", "TITLE": "BN_mod_exp may produce incorrect results on x86_64" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "OpenSSL", "version": { "version_data": [ { "version_value": "openssl-1.1.0" }, { "version_value": "openssl-1.1.0a" }, { "version_value": "openssl-1.1.0b" }, { "version_value": "openssl-1.1.0c" }, { "version_value": "openssl-1.0.2" }, { "version_value": "openssl-1.0.2a" }, { "version_value": "openssl-1.0.2b" }, { "version_value": "openssl-1.0.2c" }, { "version_value": "openssl-1.0.2d" }, { "version_value": "openssl-1.0.2e" }, { "version_value": "openssl-1.0.2f" }, { "version_value": "openssl-1.0.2g" }, { "version_value": "openssl-1.0.2h" }, { "version_value": "openssl-1.0.2i" }, { "version_value": "openssl-1.0.2j" } ] } } ] }, "vendor_name": "OpenSSL" } ] } }, "credit": [ { "lang": "eng", "value": "OSS-Fuzz project" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem." } ] }, "impact": [ { "lang": "eng", "url": "https://www.openssl.org/policies/secpolicy.html#Moderate", "value": "Moderate" } ], "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "carry-propagating bug" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:2185", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "name": "RHSA-2018:2186", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "RHSA-2018:2713", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "name": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b", "refsource": "MISC", "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "name": "FreeBSD-SA-17:02", "refsource": "FREEBSD", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "name": "https://www.openssl.org/news/secadv/20170126.txt", "refsource": "CONFIRM", "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "name": "1037717", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037717" }, { "name": "RHSA-2018:2575", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "https://www.tenable.com/security/tns-2017-04", "refsource": "CONFIRM", "url": "https://www.tenable.com/security/tns-2017-04" }, { "name": "GLSA-201702-07", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/201702-07" }, { "name": "RHSA-2018:2568", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "name": "95814", "refsource": "BID", "url": "http://www.securityfocus.com/bid/95814" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us" }, { "name": "RHSA-2018:2187", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2e:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.1.0c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2h:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2c:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.1.0b:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.1.0a:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2f:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2:beta2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2i:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:openssl:openssl:1.0.2d:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "4.1.2", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "6.8.1", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndIncluding": "5.12.0", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*", "cpe_name": [], "versionEndExcluding": "7.5.0", "versionStartIncluding": "7.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "6.9.5", "versionStartIncluding": "6.9.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*", "cpe_name": [], "versionEndExcluding": "4.7.3", "versionStartIncluding": "4.2.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "openssl-security@openssl.org", "ID": "CVE-2017-3732" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.openssl.org/news/secadv/20170126.txt", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "name": "95814", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/95814" }, { "name": "GLSA-201702-07", "refsource": "GENTOO", "tags": [ "Third Party Advisory" ], "url": "https://security.gentoo.org/glsa/201702-07" }, { "name": "1037717", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037717" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "name": "https://www.tenable.com/security/tns-2017-04", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/security/tns-2017-04" }, { "name": "FreeBSD-SA-17:02", "refsource": "FREEBSD", "tags": [ "Third Party Advisory" ], "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b", "refsource": "MISC", "tags": [ "Patch" ], "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "name": "RHSA-2018:2187", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "name": "RHSA-2018:2186", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "name": "RHSA-2018:2185", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us" }, { "name": "RHSA-2018:2568", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "name": "RHSA-2018:2575", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "name": "RHSA-2018:2713", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6 } }, "lastModifiedDate": "2022-08-29T20:43Z", "publishedDate": "2017-05-04T19:29Z" } } }
wid-sec-w-2023-1594
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Tivoli Network Manager ist eine Netzanalysesoftware f\u00fcr das Management komplexer Netze. Diese Software erfasst und verteilt Layer-2- und Layer-3-Netzdaten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer, authentisierter oder lokaler Angreifer kann mehrere Schwachstellen in IBM Tivoli Network Manager ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-1594 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1594.json" }, { "category": "self", "summary": "WID-SEC-2023-1594 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1594" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/885316" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/884276" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/883428" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/883424" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/882926" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/882898" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/882888" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/880403" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/880401" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/880395" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/879855" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/879841" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870546" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870526" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870508" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870504" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870500" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/870498" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/743933" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739297" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739271" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739249" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739247" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739245" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/739243" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/738231" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/731931" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730883" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730871" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730845" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730835" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/730171" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/720307" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/720283" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/720265" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/718745" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717345" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717335" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717327" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/717007" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/716573" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/712213" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/712199" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/570557" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/569765" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/569727" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/569717" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/305321" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/304091" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/304089" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/303663" }, { "category": "external", "summary": "IBM Security Advisory vom 2023-06-28", "url": "https://www.ibm.com/support/pages/node/303657" } ], "source_lang": "en-US", "title": "IBM Tivoli Network Manager: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-28T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:53:31.776+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-1594", "initial_release_date": "2023-06-28T22:00:00.000+00:00", "revision_history": [ { "date": "2023-06-28T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 5", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 5", "product_id": "T028343", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9_fix_pack_5" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9", "product_id": "T028344", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 4.1.1", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 4.1.1", "product_id": "T028345", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__4.1.1" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 4.2", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 4.2", "product_id": "T028346", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__4.2" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.4", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.4", "product_id": "T028347", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9.0.4" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.5", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9.0.5", "product_id": "T028348", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9.0.5" } } }, { "category": "product_name", "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 4", "product": { "name": "IBM Tivoli Network Manager IP Edition \u003c 3.9 Fix Pack 4", "product_id": "T028349", "product_identification_helper": { "cpe": "cpe:/a:ibm:tivoli_network_manager:ip_edition__3.9_fix_pack_4" } } } ], "category": "product_name", "name": "Tivoli Network Manager" } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2019-4046", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-4046" }, { "cve": "CVE-2019-4030", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-4030" }, { "cve": "CVE-2019-2684", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2684" }, { "cve": "CVE-2019-2602", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2602" }, { "cve": "CVE-2019-2537", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2537" }, { "cve": "CVE-2019-2534", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2534" }, { "cve": "CVE-2019-2531", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2531" }, { "cve": "CVE-2019-2529", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2529" }, { "cve": "CVE-2019-2503", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2503" }, { "cve": "CVE-2019-2482", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2482" }, { "cve": "CVE-2019-2481", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2481" }, { "cve": "CVE-2019-2455", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-2455" }, { "cve": "CVE-2019-1559", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-1559" }, { "cve": "CVE-2019-0220", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2019-0220" }, { "cve": "CVE-2018-8039", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-8039" }, { "cve": "CVE-2018-5407", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-5407" }, { "cve": "CVE-2018-3282", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3282" }, { "cve": "CVE-2018-3278", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3278" }, { "cve": "CVE-2018-3276", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3276" }, { "cve": "CVE-2018-3251", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3251" }, { "cve": "CVE-2018-3247", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3247" }, { "cve": "CVE-2018-3174", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3174" }, { "cve": "CVE-2018-3156", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3156" }, { "cve": "CVE-2018-3143", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3143" }, { "cve": "CVE-2018-3123", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3123" }, { "cve": "CVE-2018-3084", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3084" }, { "cve": "CVE-2018-3082", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3082" }, { "cve": "CVE-2018-3081", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3081" }, { "cve": "CVE-2018-3080", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3080" }, { "cve": "CVE-2018-3079", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3079" }, { "cve": "CVE-2018-3078", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3078" }, { "cve": "CVE-2018-3077", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3077" }, { "cve": "CVE-2018-3075", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3075" }, { "cve": "CVE-2018-3074", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3074" }, { "cve": "CVE-2018-3073", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3073" }, { "cve": "CVE-2018-3071", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3071" }, { "cve": "CVE-2018-3070", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3070" }, { "cve": "CVE-2018-3067", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3067" }, { "cve": "CVE-2018-3066", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3066" }, { "cve": "CVE-2018-3065", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3065" }, { "cve": "CVE-2018-3064", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3064" }, { "cve": "CVE-2018-3063", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3063" }, { "cve": "CVE-2018-3062", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3062" }, { "cve": "CVE-2018-3061", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3061" }, { "cve": "CVE-2018-3060", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3060" }, { "cve": "CVE-2018-3058", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3058" }, { "cve": "CVE-2018-3056", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3056" }, { "cve": "CVE-2018-3054", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-3054" }, { "cve": "CVE-2018-2877", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2877" }, { "cve": "CVE-2018-2846", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2846" }, { "cve": "CVE-2018-2839", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2839" }, { "cve": "CVE-2018-2819", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2819" }, { "cve": "CVE-2018-2818", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2818" }, { "cve": "CVE-2018-2817", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2817" }, { "cve": "CVE-2018-2816", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2816" }, { "cve": "CVE-2018-2813", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2813" }, { "cve": "CVE-2018-2812", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2812" }, { "cve": "CVE-2018-2810", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2810" }, { "cve": "CVE-2018-2805", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2805" }, { "cve": "CVE-2018-2787", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2787" }, { "cve": "CVE-2018-2786", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2786" }, { "cve": "CVE-2018-2784", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2784" }, { "cve": "CVE-2018-2782", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2782" }, { "cve": "CVE-2018-2781", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2781" }, { "cve": "CVE-2018-2780", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2780" }, { "cve": "CVE-2018-2779", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2779" }, { "cve": "CVE-2018-2778", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2778" }, { "cve": "CVE-2018-2777", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2777" }, { "cve": "CVE-2018-2776", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2776" }, { "cve": "CVE-2018-2775", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2775" }, { "cve": "CVE-2018-2773", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2773" }, { "cve": "CVE-2018-2771", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2771" }, { "cve": "CVE-2018-2769", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2769" }, { "cve": "CVE-2018-2766", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2766" }, { "cve": "CVE-2018-2762", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2762" }, { "cve": "CVE-2018-2761", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2761" }, { "cve": "CVE-2018-2759", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2759" }, { "cve": "CVE-2018-2758", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2758" }, { "cve": "CVE-2018-2755", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2755" }, { "cve": "CVE-2018-2598", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-2598" }, { "cve": "CVE-2018-1996", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1996" }, { "cve": "CVE-2018-1926", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1926" }, { "cve": "CVE-2018-1904", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1904" }, { "cve": "CVE-2018-1902", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1902" }, { "cve": "CVE-2018-1901", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1901" }, { "cve": "CVE-2018-1798", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1798" }, { "cve": "CVE-2018-1797", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1797" }, { "cve": "CVE-2018-1794", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1794" }, { "cve": "CVE-2018-1793", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1793" }, { "cve": "CVE-2018-1777", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1777" }, { "cve": "CVE-2018-1770", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1770" }, { "cve": "CVE-2018-1767", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1767" }, { "cve": "CVE-2018-1719", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1719" }, { "cve": "CVE-2018-1695", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1695" }, { "cve": "CVE-2018-1656", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1656" }, { "cve": "CVE-2018-1643", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1643" }, { "cve": "CVE-2018-1621", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1621" }, { "cve": "CVE-2018-1614", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1614" }, { "cve": "CVE-2018-1567", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1567" }, { "cve": "CVE-2018-1447", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1447" }, { "cve": "CVE-2018-1428", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1428" }, { "cve": "CVE-2018-1427", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1427" }, { "cve": "CVE-2018-1426", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1426" }, { "cve": "CVE-2018-1301", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-1301" }, { "cve": "CVE-2018-12539", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-12539" }, { "cve": "CVE-2018-10237", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-10237" }, { "cve": "CVE-2018-0734", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-0734" }, { "cve": "CVE-2018-0732", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2018-0732" }, { "cve": "CVE-2017-9798", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-9798" }, { "cve": "CVE-2017-3738", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-3738" }, { "cve": "CVE-2017-3737", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-3737" }, { "cve": "CVE-2017-3736", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-3736" }, { "cve": "CVE-2017-3735", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-3735" }, { "cve": "CVE-2017-3732", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-3732" }, { "cve": "CVE-2017-1743", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-1743" }, { "cve": "CVE-2017-1741", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-1741" }, { "cve": "CVE-2017-1731", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-1731" }, { "cve": "CVE-2017-1681", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-1681" }, { "cve": "CVE-2017-15715", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-15715" }, { "cve": "CVE-2017-15710", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-15710" }, { "cve": "CVE-2017-12624", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-12624" }, { "cve": "CVE-2017-12618", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-12618" }, { "cve": "CVE-2017-12613", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2017-12613" }, { "cve": "CVE-2016-0705", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2016-0705" }, { "cve": "CVE-2016-0702", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2016-0702" }, { "cve": "CVE-2016-0701", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2016-0701" }, { "cve": "CVE-2015-0899", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2015-0899" }, { "cve": "CVE-2014-7810", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2014-7810" }, { "cve": "CVE-2012-5783", "notes": [ { "category": "description", "text": "In IBM Tivoli Network Manager existieren mehrere Schwachstellen. Die Fehler bestehen unter anderem in den Komponenten OpenSSL, Apache CXF, Apache HTTPD, Oracle MySQL, Apache Commons, Apache Struts, IBM GSKit, Java SDK, Eclipse OpenJ9 und SAML. Ein Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Code auszuf\u00fchren, Sicherheitsma\u00dfnahmen zu umgehen, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, seine Privilegien auszuweiten, Daten zu manipulieren, nicht spezifizierte Auswirkungen zu verursachen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion oder erh\u00f6hte Berechtigungen." } ], "release_date": "2023-06-28T22:00:00.000+00:00", "title": "CVE-2012-5783" } ] }
wid-sec-w-2022-1914
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "OpenSSL ist eine im Quelltext frei verf\u00fcgbare Bibliothek, die Secure Sockets Layer (SSL) und Transport Layer Security (TLS) implementiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in OpenSSL ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder vertrauliche Daten einzusehen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows\n- Juniper Appliance\n- Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1914 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2022-1914.json" }, { "category": "self", "summary": "WID-SEC-2022-1914 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1914" }, { "category": "external", "summary": "OpenSSL Security Advisory 20170126 vom 2017-01-26", "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "category": "external", "summary": "Debian Security Advisory DSA-3773 vom 2017-01-28", "url": "https://www.debian.org/security/2017/dsa-3773" }, { "category": "external", "summary": "CISCO Security Advisory CISCO-SA-20170130-OPENSSL vom 2017-01-30", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170130-openssl?vs_f=Cisco%20Security%20Advisory\u0026vs_cat=Security%20Intelligence\u0026vs_type=RSS\u0026vs_p=Multiple%20Vulnerabilities%20in%20OpenSSL%20Affecting%20Cisco%20Products:%20January%202017\u0026vs_k=1" }, { "category": "external", "summary": "Ubuntu Security Notice USN-3181-1 vom 2017-01-31", "url": "http://www.ubuntu.com/usn/usn-3181-1/" }, { "category": "external", "summary": "NoMachine Knowledge Base Article", "url": "https://www.nomachine.com/SU01O00180" }, { "category": "external", "summary": "Tenable Advisory ID: TNS-2017-03", "url": "https://www.tenable.com/security/tns-2017-03" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0431-1 vom 2017-02-09", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170431-1.html" }, { "category": "external", "summary": "BLUECOAT Security Advisory SA14 vom 2017-02-09", "url": "https://bto.bluecoat.com/security-advisory/sa141" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0441-1 vom 2017-02-11", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170441-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0461-1 vom 2017-02-15", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170461-1.html" }, { "category": "external", "summary": "F5 Security Advisory K44512851 vom 2017-02-16", "url": "https://support.f5.com/csp/article/K44512851" }, { "category": "external", "summary": "NetApp Advisory NTAP-20170127-0001", "url": "https://kb.netapp.com/support/s/article/ka51A00000007AWQAY/NTAP-20170127-0001?language=en_US" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0495-1 vom 2017-02-17", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170495-1.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2017:0286-1 vom 2017-02-20", "url": "http://rhn.redhat.com/errata/RHSA-2017-0286.html" }, { "category": "external", "summary": "IBM Security Advisory openssl_advisory23.asc vom 2017-02-17", "url": "http://aix.software.ibm.com/aix/efixes/security/openssl_advisory23.asc" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-0286 vom 2017-02-20", "url": "http://linux.oracle.com/errata/ELSA-2017-0286.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-3519 vom 2017-02-21", "url": "http://linux.oracle.com/errata/ELSA-2017-3519.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2017-3518 vom 2017-02-21", "url": "http://linux.oracle.com/errata/ELSA-2017-3518.html" }, { "category": "external", "summary": "F5 Security Advisory K37526132 vom 2017-02-23", "url": "https://support.f5.com/csp/article/K37526132" }, { "category": "external", "summary": "FreeBSD Security Advisory: FreeBSD-SA-17:02.openssl", "url": "https://www.freebsd.org/security/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:0855-1 vom 2017-03-29", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20170855-1.html" }, { "category": "external", "summary": "Juniper Security Bulletin JSA10775 vom 2017-07-12", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10775" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2017:3343-1 vom 2017-12-16", "url": "https://www.suse.com/support/update/announcement/2017/suse-su-20173343-1.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:0112-1 vom 2018-01-16", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20180112-1.html" }, { "category": "external", "summary": "Juniper Security Advisory JSA10851 vom 2018-04-12", "url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10851" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2185 vom 2018-07-13", "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "category": "external", "summary": "FortiGuard Labs OpenSSL Security Advisory", "url": "https://fortiguard.com/psirt/FG-IR-17-019" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2018:2568 vom 2018-08-27", "url": "http://rhn.redhat.com/errata/RHSA-2018-2568.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2018:2839-1 vom 2018-09-24", "url": "https://www.suse.com/support/update/announcement/2018/suse-su-20182839-1.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2019-4747 vom 2019-08-16", "url": "http://linux.oracle.com/errata/ELSA-2019-4747.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2021-9150 vom 2021-04-01", "url": "https://linux.oracle.com/errata/ELSA-2021-9150.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-9272 vom 2022-04-08", "url": "https://linux.oracle.com/errata/ELSA-2022-9272.html" }, { "category": "external", "summary": "IBM Security Bulletin 6833208 vom 2022-11-01", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-datapower-gateway-vulnerable-to-a-flaw-in-openssl-cve-2017-3732/" }, { "category": "external", "summary": "Dell Knowledge Base Article", "url": "https://www.dell.com/support/kbdoc/en-us/000221474/dsa-2024-059-security-update-for-dell-networker-multiple-components-vulnerabilities" } ], "source_lang": "en-US", "title": "OpenSSL: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-25T23:00:00.000+00:00", "generator": { "date": "2024-08-15T17:37:20.775+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1914", "initial_release_date": "2017-01-26T23:00:00.000+00:00", "revision_history": [ { "date": "2017-01-26T23:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-01-26T23:00:00.000+00:00", "number": "2", "summary": "Version nicht vorhanden" }, { "date": "2017-01-29T23:00:00.000+00:00", "number": "3", "summary": "New remediations available" }, { "date": "2017-01-30T23:00:00.000+00:00", "number": "4", "summary": "New remediations available" }, { "date": "2017-01-31T23:00:00.000+00:00", "number": "5", "summary": "New remediations available" }, { "date": "2017-02-01T23:00:00.000+00:00", "number": "6", "summary": "New remediations available" }, { "date": "2017-02-02T23:00:00.000+00:00", "number": "7", "summary": "New remediations available" }, { "date": "2017-02-09T23:00:00.000+00:00", "number": "8", "summary": "New remediations available" }, { "date": "2017-02-09T23:00:00.000+00:00", "number": "9", "summary": "Version nicht vorhanden" }, { "date": "2017-02-12T23:00:00.000+00:00", "number": "10", "summary": "New remediations available" }, { "date": "2017-02-15T23:00:00.000+00:00", "number": "11", "summary": "New remediations available" }, { "date": "2017-02-16T23:00:00.000+00:00", "number": "12", "summary": "New remediations available" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "13", "summary": "New remediations available" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "14", "summary": "Version nicht vorhanden" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "15", "summary": "New remediations available" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "16", "summary": "New remediations available" }, { "date": "2017-02-19T23:00:00.000+00:00", "number": "17", "summary": "Version nicht vorhanden" }, { "date": "2017-02-20T23:00:00.000+00:00", "number": "18", "summary": "New remediations available" }, { "date": "2017-02-20T23:00:00.000+00:00", "number": "19", "summary": "Version nicht vorhanden" }, { "date": "2017-02-20T23:00:00.000+00:00", "number": "20", "summary": "New remediations available" }, { "date": "2017-02-22T23:00:00.000+00:00", "number": "21", "summary": "New remediations available" }, { "date": "2017-02-22T23:00:00.000+00:00", "number": "22", "summary": "New remediations available" }, { "date": "2017-03-30T22:00:00.000+00:00", "number": "23", "summary": "New remediations available" }, { "date": "2017-07-12T22:00:00.000+00:00", "number": "24", "summary": "New remediations available" }, { "date": "2017-07-12T22:00:00.000+00:00", "number": "25", "summary": "Version nicht vorhanden" }, { "date": "2017-07-23T22:00:00.000+00:00", "number": "26", "summary": "Added references" }, { "date": "2018-01-16T23:00:00.000+00:00", "number": "27", "summary": "New remediations available" }, { "date": "2018-04-12T22:00:00.000+00:00", "number": "28", "summary": "New remediations available" }, { "date": "2018-07-12T22:00:00.000+00:00", "number": "29", "summary": "New remediations available" }, { "date": "2018-07-15T22:00:00.000+00:00", "number": "30", "summary": "New remediations available" }, { "date": "2018-07-15T22:00:00.000+00:00", "number": "31", "summary": "Version nicht vorhanden" }, { "date": "2018-07-15T22:00:00.000+00:00", "number": "32", "summary": "Version nicht vorhanden" }, { "date": "2018-07-15T22:00:00.000+00:00", "number": "33", "summary": "Version nicht vorhanden" }, { "date": "2018-08-23T22:00:00.000+00:00", "number": "34", "summary": "Added references" }, { "date": "2018-08-27T22:00:00.000+00:00", "number": "35", "summary": "New remediations available" }, { "date": "2018-09-24T22:00:00.000+00:00", "number": "36", "summary": "New remediations available" }, { "date": "2019-08-18T22:00:00.000+00:00", "number": "37", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2021-03-31T22:00:00.000+00:00", "number": "38", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-04-10T22:00:00.000+00:00", "number": "39", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-10-31T23:00:00.000+00:00", "number": "40", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2024-01-25T23:00:00.000+00:00", "number": "41", "summary": "Neue Updates von Dell aufgenommen" } ], "status": "final", "version": "41" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Blue Coat Director 6.1 - 6.1.22.1", "product": { "name": "Blue Coat Director 6.1 - 6.1.22.1", "product_id": "T009383", "product_identification_helper": { "cpe": "cpe:/a:bluecoat:director:6.1.22.1" } } }, { "category": "product_name", "name": "Blue Coat IntelligenceCenter 3.3", "product": { "name": "Blue Coat IntelligenceCenter 3.3", "product_id": "T007083", "product_identification_helper": { "cpe": "cpe:/a:bluecoat:intelligencecenter:3.3" } } }, { "category": "product_name", "name": "Blue Coat ProxyAV 3.5", "product": { "name": "Blue Coat ProxyAV 3.5", "product_id": "T003290", "product_identification_helper": { "cpe": "cpe:/h:bluecoat:proxyav:3.5" } } }, { "branches": [ { "category": "product_name", "name": "Blue Coat ProxySG 6.6", "product": { "name": "Blue Coat ProxySG 6.6", "product_id": "T006617", "product_identification_helper": { "cpe": "cpe:/h:bluecoat:proxysg:6.6" } } }, { "category": "product_name", "name": "Blue Coat ProxySG 6.5", "product": { "name": "Blue Coat ProxySG 6.5", "product_id": "T006618", "product_identification_helper": { "cpe": "cpe:/h:bluecoat:proxysg:6.5" } } } ], "category": "product_name", "name": "ProxySG" } ], "category": "vendor", "name": "Blue Coat" }, { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Dell NetWorker \u003c 19.10", "product": { "name": "Dell NetWorker \u003c 19.10", "product_id": "T032354", "product_identification_helper": { "cpe": "cpe:/a:dell:networker:19.10" } } } ], "category": "vendor", "name": "Dell" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Fortinet FortiOS \u003c 5.6.0", "product": { "name": "Fortinet FortiOS \u003c 5.6.0", "product_id": "T010101", "product_identification_helper": { "cpe": "cpe:/o:fortinet:fortios:5.6.0" } } }, { "category": "product_name", "name": "Fortinet FortiOS \u003c 5.4.6", "product": { "name": "Fortinet FortiOS \u003c 5.4.6", "product_id": "T011155", "product_identification_helper": { "cpe": "cpe:/o:fortinet:fortios:5.4.6" } } } ], "category": "product_name", "name": "FortiOS" } ], "category": "vendor", "name": "Fortinet" }, { "branches": [ { "category": "product_name", "name": "FreeBSD Project FreeBSD OS", "product": { "name": "FreeBSD Project FreeBSD OS", "product_id": "4035", "product_identification_helper": { "cpe": "cpe:/o:freebsd:freebsd:-" } } } ], "category": "vendor", "name": "FreeBSD Project" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM AIX 7.1", "product": { "name": "IBM AIX 7.1", "product_id": "153340", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.1" } } }, { "category": "product_name", "name": "IBM AIX 5.3", "product": { "name": "IBM AIX 5.3", "product_id": "30418", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:5.3" } } }, { "category": "product_name", "name": "IBM AIX 6.1", "product": { "name": "IBM AIX 6.1", "product_id": "73182", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:6.1" } } }, { "category": "product_name", "name": "IBM AIX 7.2", "product": { "name": "IBM AIX 7.2", "product_id": "T006613", "product_identification_helper": { "cpe": "cpe:/o:ibm:aix:7.2" } } } ], "category": "product_name", "name": "AIX" }, { "category": "product_name", "name": "IBM DataPower Gateway", "product": { "name": "IBM DataPower Gateway", "product_id": "393635", "product_identification_helper": { "cpe": "cpe:/a:ibm:datapower_gateway:-" } } }, { "category": "product_name", "name": "IBM VIOS 2.2.x", "product": { "name": "IBM VIOS 2.2.x", "product_id": "T002859", "product_identification_helper": { "cpe": "cpe:/a:ibm:vios:2.2" } } } ], "category": "vendor", "name": "IBM" }, { "branches": [ { "category": "product_name", "name": "Juniper JUNOS", "product": { "name": "Juniper JUNOS", "product_id": "5930", "product_identification_helper": { "cpe": "cpe:/o:juniper:junos:-" } } } ], "category": "vendor", "name": "Juniper" }, { "branches": [ { "category": "product_name", "name": "NetApp OnCommand Unified Manager", "product": { "name": "NetApp OnCommand Unified Manager", "product_id": "T009408", "product_identification_helper": { "cpe": "cpe:/a:netapp:oncommand_unified_manager:-" } } } ], "category": "vendor", "name": "NetApp" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Open Source OpenSSL \u003c 1.0.2k", "product": { "name": "Open Source OpenSSL \u003c 1.0.2k", "product_id": "T009320", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.0.2k" } } }, { "category": "product_name", "name": "Open Source OpenSSL \u003c 1.1.0d", "product": { "name": "Open Source OpenSSL \u003c 1.1.0d", "product_id": "T009321", "product_identification_helper": { "cpe": "cpe:/a:openssl:openssl:1.1.0d" } } } ], "category": "product_name", "name": "OpenSSL" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T000126", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-3730", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL. Ein entfernter anonymer Angreifer kann durch das Senden speziell gestalteter Parameter f\u00fcr einen DHE- oder ECDHE-Schl\u00fcsselaustausch eine Nullzeiger-Dereferenzierung ausl\u00f6sen und so den Absturz des Ziel-Client-Dienstes herbeif\u00fchren." } ], "product_status": { "known_affected": [ "153340", "T009408", "67646", "4035", "T006613", "393635", "T004914", "T032354", "T002859", "73182", "2951", "T002207", "T000126", "5930", "30418" ] }, "release_date": "2017-01-26T23:00:00.000+00:00", "title": "CVE-2017-3730" }, { "cve": "CVE-2017-3732", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL. Ein entfernter anonymer Angreifer kann einen Fehler in BN_mod_exp () ausnutzen, um unter bestimmten Umst\u00e4nden Informationen \u00fcber den privaten Schl\u00fcssel zu erhalten." } ], "product_status": { "known_affected": [ "2951", "T002207", "4035", "T000126", "393635", "T004914", "T032354" ] }, "release_date": "2017-01-26T23:00:00.000+00:00", "title": "CVE-2017-3732" }, { "cve": "CVE-2017-3731", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in OpenSSL. Ein entfernter anonymer Angreifer kann durch das Senden eines speziell bearbeiteten, verschl\u00fcsselten Datenpakets an ein betroffenes System einen Speicherfehler ausl\u00f6sen. In der Folge kann ein Denial of Service durch den Absturz des Dienstes verursacht werden." } ], "product_status": { "known_affected": [ "153340", "T009408", "67646", "4035", "T006613", "393635", "T006618", "T006617", "T004914", "T032354", "T002859", "73182", "2951", "T002207", "T000126", "5930", "T003290", "T007083", "T009383", "30418" ] }, "release_date": "2017-01-26T23:00:00.000+00:00", "title": "CVE-2017-3731" } ] }
ghsa-5hg3-8gvm-5294
Vulnerability from github
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.
{ "affected": [], "aliases": [ "CVE-2017-3732" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-05-04T19:29:00Z", "severity": "MODERATE" }, "details": "There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL 1.0.2 before 1.0.2k and 1.1.0 before 1.1.0d. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. For example this can occur by default in OpenSSL DHE based SSL/TLS ciphersuites. Note: This issue is very similar to CVE-2015-3193 but must be treated as a separate problem.", "id": "GHSA-5hg3-8gvm-5294", "modified": "2022-05-14T01:07:14Z", "published": "2022-05-14T01:07:14Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-3732" }, { "type": "WEB", "url": "https://github.com/openssl/openssl/commit/a59b90bf491410f1f2bc4540cc21f1980fd14c5b" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2185" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2186" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2187" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2568" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2575" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2018:2713" }, { "type": "WEB", "url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-17:02.openssl.asc" }, { "type": "WEB", "url": "https://security.gentoo.org/glsa/201702-07" }, { "type": "WEB", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03838en_us" }, { "type": "WEB", "url": "https://www.openssl.org/news/secadv/20170126.txt" }, { "type": "WEB", "url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html" }, { "type": "WEB", "url": "https://www.tenable.com/security/tns-2017-04" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/95814" }, { "type": "WEB", "url": "http://www.securitytracker.com/id/1037717" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.